Local Data Security Flashcards

(12 cards)

1
Q

What is a key encapsulation mechanism?

A

A method of transferring symmetric keys using public-private key infrastructure. The symmetric key is generated by hashing a randomly generated secret. This secret is then encrypted using the receiver’s public key and is sent to them with the ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are key encapsulation mechanisms needed?

A

Public-private key encryption algorithms often have limited message sizes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 2 types of data that need protecting on a device?

A

Data at rest - Inactive data that is stored physically in any digital form
Data in use - Data being processed by a CPU or loaded in RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is disk based encryption?

A

When all of the data stored on a disk is encrypted together using a single run of an algorithm using a single key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the main advantage of disk based encryption?

A

All of the data on the disk is protected, including file system meta data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the main disadvantage of using disk based encryption?

A

If the key is compromised, the attacker has access to all files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the main advantage of file based encryption?

A

If a key is compromised, the attacker only has limited access to some files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the main disadvantage of file based encryption?

A

The meta data of the file system is often not protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 3 inputs to a key derivation function?

A

Password
Salt
Cost factor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In what situation would you use a key derivation function over a hash function?

A

To increase the cost of brute forcing a password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

State 3 secure places to store a disk encryption key

A

Smart card
TPM
USB stick

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If you are going to store the disk encryption key on the disk itself, how should it be stored?

A

Encrypt the key using another secret (such as a password)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly