cybersecurity 4.1

studied byStudied by 5 people
5.0(1)
get a hint
hint

ciphertext

1 / 42

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

Studying Progress

0%
New cards
43
Still learning
0
Almost done
0
Mastered
0
43 Terms
1
New cards

ciphertext

The encrypted message generated by a cipher

New cards
2
New cards

Steganography

Concealing messages with other data

New cards
3
New cards

modulus/mod

operation finds the remainder of a division, used in ceasar and affine cipher

New cards
4
New cards

substitution cipher

when each letter in an alphabet is replaced with a different character or symbol

New cards
5
New cards

encryption key

A string of characters used as a parameter that determines the output of an encryption algorithm

New cards
6
New cards

private/symmetric key encryption

an encryption method where the sender and receiver share a single private key

New cards
7
New cards

cipher

an algorithm used for encryption or decryption

New cards
8
New cards

cryptography

The science and art of delivering a message securely and confidentially

New cards
9
New cards

plaintext

The original message that needs to be encrypted

New cards
10
New cards

public/asymmetric key encryption

an encryption method that uses two keys, a public key available to everyone and a private key belonging to one owner.

New cards
11
New cards

ALGORITHM

steps needed to accomplish a task

New cards
12
New cards

What is the difference between “Sign and Encrypt”, “Encrypt” and “Sign”?

With encrypt, you’re using a public key and the receiver will have to use their private key to decrypt the message. With sign, the opposite of encrypt is happening, I’ll be using my private key and the receiver will be using my public key.

New cards
13
New cards

one-way function

a math function that is easy to do but very hard to undo.

New cards
14
New cards

statements that are true about symmetric encryption.

It has a large key space

New cards
15
New cards

statements that are true about symmetric encryption.

It exchanges one shared key.

New cards
16
New cards

statements that are true about symmetric encryption.

It uses a relatively simple and fast algorithm.

New cards
17
New cards

statements that are true about asymmetric encryption.

It uses a relatively smaller key space.

New cards
18
New cards

statements that are true about asymmetric encryption.

It is more secure because of the privately held keys.

New cards
19
New cards

statements that are true about asymmetric encryption.

It is relatively slow due to its more complex calculations.

New cards
20
New cards

statements that are true about asymmetric encryption.

It can be used for encrypting and signing a message.

New cards
21
New cards

Data at rest

Data that’s stored somewhere else; ex: bank account

New cards
22
New cards

Data in transit

data that’s being transferred between applications,host or around the network; ex: an email on its way to a recipient; the results coming back from an internet search

New cards
23
New cards

Data in process

data that is manipulated by an application; ex: A website calculating the tax of an item

New cards
24
New cards

TRUSTED PLATFORM MODULE

mechanism that provides secure encryption for a device

New cards
25
New cards

How do recovery keys and hash values differ

Recovery keys are created by the operating system to store the key to the drive, in the event a password is lost. \n Hash values are created at encryption time and represent passwords that control access to the encrypted data.

New cards
26
New cards

Disks

physical drives inside of a pc

New cards
27
New cards

volume

the accessible storage area on a hard drive or disk

New cards
28
New cards

Partition

a part of a volume that's formatted for the operating system to use as a storage area

New cards
29
New cards

container

a file that has other data and acts like a drive

New cards
30
New cards

HASH

a computational process that converts data of varying size to a fixed-size.

New cards
31
New cards

CRYPTOCURRENCY

A digital cash system

New cards
32
New cards

what can be encrypted to secure data at rest?

  • Entire disk drives

New cards
33
New cards

what can be encrypted to secure data at rest?

  • Portions of disk drives, such as containers

New cards
34
New cards

what can be encrypted to secure data at rest?

  • Individual files

New cards
35
New cards

what can be encrypted to secure data at rest?

Application specific documents

New cards
36
New cards

what happens when you mount vs dismount the container.

When you mount it, the drive is visible in file explorer, but when you dismount it, it is no longer visible

New cards
37
New cards

With all of these historical examples of writing, what are the limitations?

  • Today, computer algorithms could quickly discover patterns and find the hidden data.

New cards
38
New cards

With all of these historical examples of writing, what are the limitations?

  • Messages and keys could be discovered by outsiders.

New cards
39
New cards

covert

messages that we want to keep hidden

New cards
40
New cards

overt

messages that you don’t mind if people can see

New cards
41
New cards

SUBSTITUTION STEGANOGRAPHY

Substitution just replaces data that isn’t important or redundant information with the covert data.

New cards
42
New cards

ALTERNATE DATA STREAMS

Files can be separated into multiple resources, so you can attach an icon to a file and the icon will be stored with the file.

New cards
43
New cards

STEGANALYSIS

the process of analyzing data for hidden content

New cards