Encryption technologies 1.4 Flashcards

(7 cards)

1
Q

Trusted platform module (TPM)

A

A specification for cryptographic functions. Cryptography hardware on a device.

Cryptographic processor. Random number generator, key generators.

Persistent memory. Unique keys burned in during manufacturing.

Versatile memory. Storage keys, hardware configuration information. Securley store BitLocker keys.

Password protected. No dictionary attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hardware security module (HSM)

A

Used in large environments. Clusters, redundant power, securely store thousands of cryptographic keys.

High end cryptographic hardware. Plug in card or separate hardware device.

Key Backup. Secure storage in hardware.

Cryptographic accelerators. Offload that CPU overhead from other devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key management system

A

Services are everywhere. On premises, cloud based. Many different keys for many different services.

Manage all keys from centralized manager. Often provided as third party software. Separate the encryption keys from the data.

All key management from one console. Create keys for a specific service or cloud provider (SSL/TLS, SSH, etc.). Associate keys with specific users, rotate keys on regular intervals, log key use and important events.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Dashboard of key management system (see video).

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Keeping data private importance

A

Our data is located in many different places. Mobile phones, cloud, laptops, etc. Most private data is often physically closest to us.

Attackers are always finding new techniques. It’s a race to stay one step ahead.

Our data is changing constantly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Secure enclave

A

Protected area for our secrets. Often implemented as a hardware processor. Isolated from the main processor. Many different technologies and names.

Provides extensive security features. Has its own ROM. Monitors the system boot process. True random number generator. Real time memory encryption, root cryptographic keys, performs AES encryption in hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly