Encryption can be used to secure portable devices like laptops and cell phones. Most current operating systems use _______ to prevent unauthorized parties from viewing the data on the machine.
disk encryption
Encryption can be used to secure portable devices like laptops and cell phones. Most current operating systems use disk encryption to prevent unauthorized parties from viewing the data on the machine.
Microsoft Windows uses a symmetric disk encryption program called BitLocker.
Macs use a symmetric disk encryption program called FileVault.
True or False
Emails are natively encrypted. They are sent and received in plaintext.
False
Emails are NOT natively encrypted. They are sent and received in plaintext.
Programs like _____ and _____ can apply
public key cryptography to provide email
confidentiality and use digital signatures
to ensure authenticity and integrity.
Programs like S/MIME and PGP can apply public key cryptography to provide email confidentiality and use digital signatures
to ensure authenticity and integrity.
___________ is a protocol
designed to encrypt web traffic.
Secure Socket Layer (SSL) is a protocol
designed to encrypt web traffic.
○ HTTPS actually stands HTTP over SSL.
These certificates use public key cryptography to establish a secure connection between the browser and the server.
A _________ is a cybersecurity professional who captures and investigates digital evidence from computers, cell phones, and other devices containing digital data.
A forensic examiner is a cybersecurity professional who captures and investigates digital evidence from computers, cell phones, and other devices containing digital data.
True or False
Forensic examiners make a hash of
a device when it is initially collected
for investigation.
True
_________ is the cryptographic technique of placing hidden messages
within files, images, or videos.
Steganography is the cryptographic technique of placing hidden messages within files, images, or videos.
_________ are small data files that use public key
cryptography to secure connections between the browser and the web server.
SSL certificates are small data files that use public key cryptography to secure connections between the browser and the web server.
To get an SSL, an organization must first reach out to a ___________ , an organization responsible for issuing SSL certificates.
To get an SSL, an organization must first reach out to a certificate authority (CA), an organization responsible for issuing SSL certificates.
What information does a CA need to get a SSL certificate?
When generating the CSR, a _______ and _______ pair are created.
When generating the CSR, a private and public key pair are created.
SSL certificates validate authenticity using a _______.
SSL certificates validate authenticity using a chain of trust.
Browsers have a pre-established list of trusted CAs, called a _________.
Browsers have a pre-established list of trusted CAs, called a ________.
Root certificate authorities are a list of CAs trusted by your browser. They’re at the top of the trust chain and are typically not the organizations that issue SSL certificates.
Intermediate certificate authorities usually issue certificates and report up to a root certificate authority.
Explain the process of an SSL certificate
What does SSL stand for?
Secure Socket Layer
What’s the difference between SSL and TLS?
SSL refers to Secure Sockets Layer whereas TLS refers to Transport Layer Security. Basically, they are one and the same, but, entirely different.
How similar both are? SSL and TLS are cryptographic protocols that authenticate data transfer between servers, systems, applications and users. For example, a cryptographic protocol encrypts the data that is exchanged between a web server and a user.
A _____________ exploits weakness in cryptographic algorithms by attempting to determine if the “random” values produced are actually predictable.
A statistical attack exploits weakness in cryptographic algorithms by attempting to determine if the “random” values produced are actually predictable.
Give some examples of a cryptographic attacks
What are rainbow tables?
Rainbow tables are resources that contain precomputed hashes with the associated plaintext passwords.
We can defend against rainbow tables by _________, a cryptographic method of combining salt (a random value) with the plaintext into the hash function.
We can defend against rainbow tables by salting, a cryptographic method of combining salt (a random value) with the plaintext into the hash function.
_______ is a command-line tool that can automate the cracking of hashes.
Hashcat is a command-line tool that can automate the cracking of hashes.
Hashcat uses ______, ______ and ______methods to figure out plaintext passwords from hashes.
Hashcat uses dictionary wordlists, rainbow tables, and brute force methods to figure out plaintext passwords from hashes.