Encrypting data 1.4 Flashcards

(10 cards)

1
Q

Encrypting stored data overview

A

Protect data on storage devices. SSD, hard drive, USB drive, cloud storage, etc. This is data at rest.

Full disk and partition/volume encryption. BitLocker, FileVault, etc.

File encryption. EFS (Encrypting File System), third party utilities can perform simillar functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Database encryption

A

Protecting stored data and the transmission of that data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Transparent encryption

A

Encrypt all database information with a symmetric key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Record level encryption

A

Encrypt individual columns, use separate symmetric keys for each column.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Transport encryption

A

Protect data traversing the network. You’re doing this right now.

Encrypting in the application. Browser can communicate using HTTPS.

VPN (virtual private network). Encrypts all data transmitted over the network, regardless of the application. Client based VPN using SSL/TLS. Site to site VPN using IPsec.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Encryption algorithm comparison (see vid),

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encrypting algorithms processes

A

Many ways to encrypt data. Proper formula must be used during encryption and decryption.

Both sides decide on the algorithm before encrypting the data. The details are often hidden from the end user..

There are advantages and disadvantages between algorithms. Security level, speed, complexity of implementation, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptographic keys

A

Very little that isn’t known about the cryptographic process. The algorithm is usually a known entity. Only thing you don’t know is the key.

The key determines the output. Encrypted data, Hash value, digital signature.

Keep your key private! It’s the only thing protecting your data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Key lengths importance

A

Larger keys tend to be more secure. Prevent brute force attacks. Attackers can try every possible key combination.

Symmetric encryption. 128 bit or larger symmetric keys are common. These numbers get larger and larger as time goes on

Asymmetric encryption. Complex calculations of prime numbers. Larger keys then symmetric encryption. Common to see key lengths of 3,072 bits or larger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Key stretching def and importance.

A

A weak key is a weak key and by itself is not very secure.

Make a weak key stronger by performing multiple processes. has a password. Has the Hash of the password. And continue. Key Stretching, Key Stretching.

Brute Force Attacks would require reversing each of those hashes. The attacks have to spend much more time, even though the key is small.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly