• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/70

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

70 Cards in this Set

  • Front
  • Back
Integrity

Provides assurances that data has not been modified
hash

a number derived form performing a calculation on data, such as a message or file
Confidentiality

ensures that data is only viewable by authorized users
Symmetric encryption


uses the same key to encrypt and decrypt data



Asymmetric encryption

uses two key (public and private) created as a matched pair
Authentication

Validates and identity
Non-repudiation

is a process designed to prevent a party from denying an action
MD5

Message Digest 5
Message Digest 5

a hashing algorithm
SHA

Secure Hash Algorithm
Secure Hash Algorithm
a hashing algorithm
HMAC

Hash-based Message Authentication Code
Hash-based Message Authentication Code
is a secret code the is coupled with hashing algorithm to increase integrity
FCIV

File Checksum Integrity Verifier
File Checksum Integrity Verifier
a free command prompt utility that computes and verifies cryptographic hash values
RIPEMD
Race Integrity Primitives Evaluation Message Digest

RIPEMD, NTLM are...?

Hashing algorithms
Race Integrity Primitives Evaluation Message Digest
a hashing algorithm
LANMAN

LAN Manager
LAN Manager
a legacy authentication protocol
NTLM

New Technology LAN Manager
New Technology LAN Manager
a legacy protocol used with MD4 algorithm, but both are compromised
AES

Advanced Encryption Standard
Advanced Encryption Standard
a strong symmetric block cipher. has a key the is 128, 192, or 256
DES

Data Encryption Standard
Data Encryption Standard
uses only a 56 bit key so it is now susceptible to brut force attacks.
3DES

Triple Data Encryption Standard
Triple Data Encryption Standard
a encryption algorithm that is an improvement over DES since is uses 56 bits, 112 bits or 168 bits.
RC4

Ron's Code or Rivest's Cipher...is a symmetric stream cipher created by Ron Rivest
One-time pads

a hardcopy printouts of keys in a pad of paper. Two people have the pads and after identifying which key to use they destroy the page and the person reading uses the key and destroys their page.
Blowfish

a strong symmetric block cipher
Twofish

a strong symmetric block cipher
Asymmetric Encryption Rule

Only a private key can decrypt information encrypted by a matching public key


Only a public key can decrypt information encrypted by a matching private key.

Certificates

are used in asymmetric encryption to pass on public keys from their owners.
Certificates include what info...? (6)

Serial Number


issuer


Validity Dates


Subject


Public Key


Usage

RSA

Rivest, Shamir, and Adleman (RSA)





Rivest, Shamir, and Adleman (RSA) what is it?
a tool for creating public and private keys. Very secure and used for credit card transactions on the internet
Diffie-Hellman

is a key exchange algorithm used to privately share a symmetric key between 2 parties.
ECC
Elliptic Curve Cryptography
Elliptic Curve Cryptography
is a key algorithm used on wireless devices since it uses smaller key sizes using less power than other encryption methods.
Steganography

hides data in other data. and example would be hiding data in a written file very small so that it looks like a dot or a dash.
Quantum Cryptography
entails sending streams of modified protons (either emitting light up and down or side to side). each photon can be read as either a 1 or a zero which allows them to be used to create an encryption key.
SSL

Secure Sockets Layer
Secure Sockets Layer
an encryption protocol used to encrypt internet traffic
TLS

Transport Layer Security
Transport Layer Security (TLS)

is a replacement for SSL which is an encryption protocol for internet traffic
What is required to run SSL and TLS?

a CA since certificates are necessary for them to run.


Which key encrypts and decrypts for e-mail digital signatures?


private encrypts


Public decrypts

Which key encrypts and decrypts for e-mail?

Public Key Encrypts


Private Key Decrypts

Which key encrypts and decrypts for websites?

Public Key Encrypts


Private Key Decrypts

Signing e-mail with digital signatures provides what security measures? (3)

Authentication


Non-repudiation


Integrity

S/MIME

Secure / Multipurpose Internet Mail Extensions
Secure / Multipurpose Internet Mail Extensions (S/MIME)
one of the most popular standards used to digitally sign and encrypt e-mail.
PGP/GPG

Pretty Good Privacy and GNU Privacy Guard both are e-mail encryption protocols that use and RSA Algorithm and public and private keys for encryption and decryption.
How does HTTPS us Symmetric and Asymmetric encryption?
it uses Asymmetric Encryption to transmit a Symmetric key. Once both parties have the same key the actual data is encrypted using Symmetric Encryption.
How do SSL and TLS us Asymmetric and Symmetric encryption in secure web sessions???
The websites public key encrypts a symmetric key and the symmetric key encrypts data within the web session
Public Key Infrastructure (PKI)

Is used to request, create, manage, store, distribute and revoke digital certificates.
CA

Certificate Authority
Certificate authority


issues, manages, validates, and revokes


certificates

Hierarchical trust model

Root CA


I


Intermediate CA


I


Child CA


I


End User

RA
Registration Authority
Registration Authority
an individual in a large organization that assists in the certificate registration process.
6 Common reasons to revoke a certificate

Key Compromise


CA compromise


Change in affiliation


Superseded


Cease of Operation


Certificate hold

CRL

Certificate Revocation List
OCSP

Online Certificate Status Protocol
Online Certificate Status Protocol
allows the client to query the CA with the serial number and then responds with healthy, revoked or unknown.
What does it mean is an OCSP responds with unknown?
the certificate is a forgery
Key Escrow


the process of placing a private key in a safe environment in the event the original is lost. is often used if loss of encrypted data is unacceptable.



Recovery Agent
An designated individual who can recover or restore cryptographic keys (private keys).