Cybersecurity Essentials Quiz Review
Stream
A cipher that encrypts plaintext one byte or bit per time
Masking
A data technique that replaces sensitive info w/ nonsensitive information. After the replacement, the nonsensitive information looks and acts like the original
Elliptic Curve Cryptography (ECC)
Uses elliptic curves as part of algorithm for digital signature generation and key exchange
Asymmetric
Uses one key to encrypt data and another key to decrypt data
Symmetric
Uses the same shared key to do both encryting and decrypting
Three processes of Logical Access Controls
- Firewalls - Biometrics - Intrusion Detection System IDS
Two Cipher Keys:
- Key Length - Key Space
Administrative Access Controls:
1. Hiring Practices 2. Background Checks 3. Policies & Procedures
Social Steganography
Creating a message that says one thing, but means something else to a specific audience
Obfuscation
Making a message confusing so it is harder to understand
Steganography
To hide all data within an audio file
Block
Transforms a fixed-length block of plaintext into a block of ciphertext. In order to decrypt the ciphertext, the same secret key for encryption is used in reverse
Deterrent
Are meant to discourage or mitigate an action or behavior of a malicious person
Examples of Physical Access Control Devices
Cameras, Swipe Cards, + Locks
Steganalysis
Discovering that hidden information exists within a graphic file
Transposition
In this method, all letters are rearranged
Watermarking
Inserts a secret message into a program as proof of ownership and protects software from unauthorized access or modification
Advanced Encryption Standard (AES)
Is used to protect classified information by the U.S. government and is a strong algorithm that uses longer key lengths
Diffie-Hellman Algorithm
Provides an electronic exchange method to share a secret and is used by multiple secure protocols
Three protocols that can use asymmetric key algorithms
Secure Socket Layer (SSL) Secure Shell (SSH) Pretty Good Privacy (PGP)
Cryptology
The science of making and breaking codes to make sure cyber criminals can't easily compromise protected information