What is ‘data at rest’ encryption?
Protecting data stored on devices like SSDs or hard drives.
Name two common operating system tools used for data at rest encryption.
What is the purpose of the Encrypting File System (EFS) in Windows?
File-level encryption allowing users to encrypt individual files or folders.
How does EFS differ from full disk encryption?
EFS secures specific data rather than the entire storage volume.
What is transparent database encryption?
A method using a symmetric key to encrypt all data within a database.
What is a potential drawback of transparent database encryption?
Overhead involved in decrypting the entire database for access.
How does column-level encryption help mitigate overhead in databases?
Encrypts specific sensitive columns while leaving less sensitive data unencrypted.
What is the role of HTTPS in network data encryption?
Encrypts all communication between a web browser and a server.
What is a Virtual Private Network (VPN)?
Creates an encrypted tunnel for secure data transmission between devices.
Name two common protocols used with VPNs.
Why must both sender and receiver use the same encryption algorithm?
To ensure the receiver can correctly decrypt the data encrypted by the sender.
Briefly compare the DES and AES encryption algorithms.
DES uses five steps for 64-bit ciphertext; AES combines plaintext and a secret key.
What is the key difference between knowing an encryption algorithm and being able to decrypt data?
Knowing the algorithm is public knowledge; decrypting data requires the specific key.
What is key stretching (or key strengthening)?
Performing encryption multiple times on the same data to enhance security.
How does key stretching enhance security against brute-force attacks?
Increases computational effort and time required for an attacker to brute-force data.
What is full disk/volume level encryption?
Encryption that secures all data on an entire storage device or partition.
What is the Encrypting File System (EFS) in Windows?
A file-level encryption technology built into the NTFS file system.
Define transparent encryption.
Method of encrypting database data automatically without user intervention.
What is column-level encryption in databases?
Encryption technique where only specific sensitive columns are encrypted.
What does HTTPS stand for?
Hypertext Transfer Protocol Secure.
What is the purpose of a VPN?
Creates a secure, encrypted connection over a less secure network.
What does SSL/TLS stand for?
Secure Sockets Layer/Transport Layer Security.
What is IPsec?
A suite of protocols used to secure IP communications by authenticating and encrypting data.
What is an encryption algorithm?
A mathematical formula used to transform plaintext into ciphertext and vice versa.