Cybersecurity Essentials Quiz Review

Ace your homework & exams now with Quizwiz!

Stream

A cipher that encrypts plaintext one byte or bit per time

Masking

A data technique that replaces sensitive info w/ nonsensitive information. After the replacement, the nonsensitive information looks and acts like the original

Elliptic Curve Cryptography (ECC)

Uses elliptic curves as part of algorithm for digital signature generation and key exchange

Asymmetric

Uses one key to encrypt data and another key to decrypt data

Symmetric

Uses the same shared key to do both encryting and decrypting

Three processes of Logical Access Controls

- Firewalls - Biometrics - Intrusion Detection System IDS

Two Cipher Keys:

- Key Length - Key Space

Administrative Access Controls:

1. Hiring Practices 2. Background Checks 3. Policies & Procedures

Social Steganography

Creating a message that says one thing, but means something else to a specific audience

Obfuscation

Making a message confusing so it is harder to understand

Steganography

To hide all data within an audio file

Block

Transforms a fixed-length block of plaintext into a block of ciphertext. In order to decrypt the ciphertext, the same secret key for encryption is used in reverse

Deterrent

Are meant to discourage or mitigate an action or behavior of a malicious person

Examples of Physical Access Control Devices

Cameras, Swipe Cards, + Locks

Steganalysis

Discovering that hidden information exists within a graphic file

Transposition

In this method, all letters are rearranged

Watermarking

Inserts a secret message into a program as proof of ownership and protects software from unauthorized access or modification

Advanced Encryption Standard (AES)

Is used to protect classified information by the U.S. government and is a strong algorithm that uses longer key lengths

Diffie-Hellman Algorithm

Provides an electronic exchange method to share a secret and is used by multiple secure protocols

Three protocols that can use asymmetric key algorithms

Secure Socket Layer (SSL) Secure Shell (SSH) Pretty Good Privacy (PGP)

Cryptology

The science of making and breaking codes to make sure cyber criminals can't easily compromise protected information


Related study sets

Chapter 2 - Neuromuscular Fundamentals

View Set

The Civil War Begins and The Politics of War

View Set

Praxis - Elementary Education: Multiple Subjects (5001)

View Set

Byzantine Empire/ Fall of Roman Empires

View Set

Health Promotion and Disease Prevention (MODULE 2)

View Set

Social Studies-Chapter 9-Roman Civilization

View Set

Bone Module #2: The Appendicular Skeleton

View Set