Shared Flashcard Set

Details

CASP Study Material (COMPTIA Advanced Security Practitioner)
COMPTIA Advanced Security Practitioner
19
Computer Networking
Not Applicable
04/09/2014

Additional Computer Networking Flashcards

 


 

Cards

Term
Chapter 1

Scytale
Definition
System functioned by wrapping a strip of papyrus or leather around a rod of fixed diameter on which a message was written
Term
CH 1

Caesars Cipher
Definition
Plain text was rotated by 3 letters (ex: cat was FDW)
Term
CH 1

Privacy (Confidentiality)
Definition
What is private should stay private, whether at rest or in transit
Term
Ch1

Authentication
Definition
Proof that a message is from the person or entity we believe ti yo be from
Term
CH1

Integrity
Definition
Information should remain unaltered
Term
Ch1

Non-Reputiation
Definition
Proof of delivery and recipient is assured of senders identity.
Term
Ch1

Truecypt and Bitlocker
Definition
Offer ability to encrypt HD
Term
Ch1

Plain Text
Definition
Clear text that is readable
Term
Ch1

Cipher Text
Definition
Encrypted text atht is unreadable
Term
Ch1

Encryption
Definition
Transforming data into an unreadable format. For example, using Ceasar's cipher to encrypt the word cat would result in fdw. Encryption here has moved each character forward three letters.
Term
Ch1

Cryptanalysis
Definition
The act of obtaining plain text from cipher text without a cryptographic key. It is used by governments, the military, enterprised, ethical hackers, and malicious hackers to find weaknesses and crack cryptographic systems.
Term
Ch1

Digital Signature
Definition
A hash value that has been encrypted with the private key of the sender. It is used for authentication and integrity.
Term
Ch1

Symmetric Cryptography
Definition
This type uses a single private key
Term
Ch1

Asymmetric Cryptography
Definition
This type uses two keys: a public key know to everyone and a private key that only the recipient of messages uses.
Term
Ch1

Hash
Definition
mathematical procedure or function that coverts a large amount of data into a fixed samll string of data or integer. The output of a hash is known as a hash value, hash code, hash sum, checksum, fingerprint or message digest.
Term
Ch 1

Block Cipher
Definition
Function by dividing the message into blocks for processing
Term
Ch1

Stream Ciphers
Definition
Functions by dividing the message into bits for processing.
Term
Ch1

Cryptographic key
Definition
How strong the encryption process is relies in part on the cryptograpic algorithm functions. It can be used to control the transformation of plain text to cipher text or cipher text to plain text.
Term
Ch1

Entropy
Definition
Although key size is important, the randomness of the key is also critical. You may have been asked to create a random key before and not realized what you were actually doing.
Supporting users have an ad free experience!