module 2 Flashcards

(41 cards)

1
Q

Cryptography: Hashing

A

one-way (irreversible) function that produces a unique ‘hash digest’. ensures data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptography: 2 sides of cryptography

What does it ensure?

A

2 way street (encryption & decryption); ensures CONFIDENTIALITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptography: Salting

A

adding additional random characters to a pw so that no 2 passwords will produce the same hash digest, even if the initial passwords are the same

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cryptography: Collision

A

When different inputs produce the same hashed output, indicating weakness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cryptography: Hashing Algorithms (3)

A

Common hashing functions. Produce a hash digest. MD5 (old), SHA-256, and SHA-512

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptography: Symmetric encryption

A

same key used to both encrypt & decrypt, therefore easily broken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cryptography: Asymmetric Encryption

A

uses different keys for encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cryptography: PKI

A

public key infrastructure

ensures a public key corresponds to only ONE person/entity, to avoid private key/info sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cryptography: Certificate definition
- 2 types

A

a unique key-pair assignment from a certificate authority. types: third-party and self-signed (for use within org)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cryptography: Certificate Authority

A

a trusted org that assigns certs to applicants, maintains records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cryptography: Intermediate CA

A

different levels of CAs (certificate authority) help segment certificate management. if one goes down, fewer people have to recertify. lower ones must be certified by a higher-authority CA. trace chain of trust back to a root ca.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cryptography: OCSP

A

online certification status protocol: lets a host query the status of a cert

  • faster alternative to CRL that checks a cert’s validity in real time
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cryptography: certificate duration — & is longer or shorter most secure?

A

-usually 3 mo-1 year
- shorter cert durations are more secure bc if one is compromised, it won’t stay valid for long—limiting exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cryptography Applications: Code Signing

A

done via hashing the file & signing the hash with the developer’s private key to provide a certificate-based digital signature. signature = encrypted hash + timestamp ensures INTEGRITY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cryptography Applications: Digital Signatures definition

A

a digital signature is a cryptographic way to prove:
1 INTEGRITY
2 AUTHENTICITY
3 NON-REPUDIATION

comprised of a hash digest of the message, which is then encrypted with the sender’s private key

NOTE: digital signatures are NOT encryption of the message itself; they do NOT offer confidentiality. just authenticity (not in CIA) and integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cryptography Applications: Blockchain

A
  • decentralized & distributed public transaxn ledger
  • usually managed by peer-to-peer network
  • secure bc an attacker would have to take over a majority of the network to successfully add falsified info
  • most popular = bitcoin (cryptographic coin)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cryptographic Tools: Key management (Curtain Soon Drops—Raise, Revoke, Destroy)

A

full lifecycle handling of cryptographic keys:

creation, storage, distribution, rotation/rollover, revocation, and destruction

during key ro

18
Q

Cryptographic Tools: Secure Enclave

A

encrypted, physically + logically isolated portion of a device. use dfor storing keys, cryptographic calculations, DRM. only specific apps/processes can interact with it.

19
Q

Cryptographic Tools: TPM

A

trusted platform module
- chip for identifying a specific sysem motherboard. either on it or add-on. protects small amounts of sensitive info

20
Q

Cryptographic Tools: HSM

A

hardware security module
basically a GPU. handles intense encryption/decryption computations offloaded from main CPU

21
Q

Levels of encryption (6): First Position Very Firm Demi Rond

A
  1. FDE, full disc encryption
  2. Partition-level encryption
  3. Volume level encryption
  4. File-level encryption.
  5. Database-level encryption.
  6. Record-level encryption
22
Q

Cryptography: ROT

A

rotated [meaning alphabet has been rotated from its original position, eg ROT13 = alphabet rotated 13 spaces]

23
Q

Asymmetric Encryption: Diffe-Hellman Key Exchange

A

Each party calculates S using their private key and the other’s public key: S = (other public key)^(own private key) mod p. They end up with the same S, which is never transmitted.

24
Q

Cryptography: Encryption: In-band and out-of-band exchanges

A

in-band: keys exchanged over same primary channel used for communication
out-of-band: keys sent over unrelated channel eg verbally or mail

25
Cryptography: key length & strength
the longer the better, but must still be usable
26
Cryptography Applications: Blockchain: peer-to-peer network
a decentralized network where each node (peer) stores a copy of the blockchain and can validate, share, and relay transactions without a central server
27
Cryptographic Tools: TEE
trusted execution environment
28
Cryptographic Tools: Key management: what happens during key rotation?
1 new key generated 2 cert reissued if it’s a cert key 3 old key retired & maybe archived 4 key distribution (to stystems & users) updated
29
Cryptography Applications: Digital Signatures: How do they work?
THE SENDER: 1. Hashes the message 2. encrypts that hash digest with their private key. these two together = DIGITAL SIGNATURE 3. sends th original message, digital signature, and often a digital cert w their public key THE RECIPIENT: 1. hashes the message themselves 2. decrypts the signature using the sender’s public key 3. if decrypted digest matches the one they just computed
30
Cryptography: when is a certificate added to the CRL?
when it’s been revoked prematurely for some reason—compromised, misused, or is no longer valid (eg domain ownership changed) note: expired certs are NOT added to the CRL.
31
Cryptography: how does a system use a CRL?
downloads the CRL and checks whether a cert is on the list before trusting it
32
Cryptography: why is OCSP faster than CRL?
bc it doesn’t download the full CRL. it sends a query to the CA asking “is this cert still valid?” and gets a direct answer
33
Levels of encryption: FDE Examples 2
Encrypts the entire drive, including OS and bootloader ex: BitLocker, FileVault Analogy: like locking down the entire stage—no one performs until the curtain rises with the key.
34
Levels of encryption: Partition-Level Encryption When useful?
Encrypts just one section (partition) of a drive. Useful in dual-boot systems. Or when storing private data separately
35
Levels of encryption: Volume-Level Encryption What is it often used with?
Encrypts an entire volume (group of partitions or a logical drive). Often used w. virtual or logical disk structures.
36
Levels of encryption: File-Level Encryption What 2 rhings are used for this?
Encrypts one file at a time. EFS (encrypting File System), GPG for files. Analogy: Like locking up a dance’s diary, while the rest of the room is open
37
Levels of encryption: Database-Level Encryption Ex?
Encrypts the full database or a major chunk like tables or schemas. Ex: Transparent Data Encryption (TDE) Analogy: The casting list is kept under lock and key.
38
Levels of encryption: Record-Level Encryption
Encrypts individual rows (records) within a database. Ideal for multitenant databases or fine-grained access control Analogy: Each dancer’s contract is sealed in their own envelope; each dancer only has they envelope key to their own. Director has the master key.
39
pci dss
payment card industry data security standard
40
cipher
an algorithm to convert plaintext into ciphertext and vice versa To recover the plaintext, we must pass the ciphertext along with the proper key via the decryption function, which would give us the original plaintext.
41