1.4 Data Encryption and Its Algorithms Flashcards

(31 cards)

1
Q

What is ‘data at rest’ encryption?

A

Protecting data stored on devices like SSDs or hard drives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name two common operating system tools used for data at rest encryption.

A
  • BitLocker (Windows)
  • FileVault (Mac OS)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of the Encrypting File System (EFS) in Windows?

A

File-level encryption allowing users to encrypt individual files or folders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does EFS differ from full disk encryption?

A

EFS secures specific data rather than the entire storage volume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is transparent database encryption?

A

A method using a symmetric key to encrypt all data within a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a potential drawback of transparent database encryption?

A

Overhead involved in decrypting the entire database for access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does column-level encryption help mitigate overhead in databases?

A

Encrypts specific sensitive columns while leaving less sensitive data unencrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the role of HTTPS in network data encryption?

A

Encrypts all communication between a web browser and a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Virtual Private Network (VPN)?

A

Creates an encrypted tunnel for secure data transmission between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name two common protocols used with VPNs.

A
  • SSL/TLS
  • IPsec
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why must both sender and receiver use the same encryption algorithm?

A

To ensure the receiver can correctly decrypt the data encrypted by the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Briefly compare the DES and AES encryption algorithms.

A

DES uses five steps for 64-bit ciphertext; AES combines plaintext and a secret key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the key difference between knowing an encryption algorithm and being able to decrypt data?

A

Knowing the algorithm is public knowledge; decrypting data requires the specific key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is key stretching (or key strengthening)?

A

Performing encryption multiple times on the same data to enhance security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does key stretching enhance security against brute-force attacks?

A

Increases computational effort and time required for an attacker to brute-force data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is full disk/volume level encryption?

A

Encryption that secures all data on an entire storage device or partition.

17
Q

What is the Encrypting File System (EFS) in Windows?

A

A file-level encryption technology built into the NTFS file system.

18
Q

Define transparent encryption.

A

Method of encrypting database data automatically without user intervention.

19
Q

What is column-level encryption in databases?

A

Encryption technique where only specific sensitive columns are encrypted.

20
Q

What does HTTPS stand for?

A

Hypertext Transfer Protocol Secure.

21
Q

What is the purpose of a VPN?

A

Creates a secure, encrypted connection over a less secure network.

22
Q

What does SSL/TLS stand for?

A

Secure Sockets Layer/Transport Layer Security.

23
Q

What is IPsec?

A

A suite of protocols used to secure IP communications by authenticating and encrypting data.

24
Q

What is an encryption algorithm?

A

A mathematical formula used to transform plaintext into ciphertext and vice versa.

25
What does DES stand for?
Data Encryption Standard.
26
What does AES stand for?
Advanced Encryption Standard.
27
What is a secret key/encryption key?
A string of bits determining the output of an encryption algorithm.
28
What is a brute-force attack?
A method of trying every possible combination of a key until the correct one is found.
29
What is key length?
The number of bits in an encryption key, influencing its strength.
30
What is asymmetric encryption?
A system using a pair of keys: a public key for encryption and a private key for decryption.
31
What is key stretching?
A technique to increase the computational cost of brute-forcing a password.