Upgrade to remove ads
Official (ISC)² CISSP - Domain 3: Security Architecture and Engineering
Terms in this set (39)
A mathematical function that is used in the encryption and decryption processes.
Not identical on both sides. In cryptography,
key pairs are used, one to encrypt, the other
Ensuring timely and reliable access to and use of information by authorized users.
Certificate authority (CA)
An entity trusted by one or more users as an authority in a network that issues, revokes, and manages digital certificates to bind
individuals and entities to their public keys.
Security model with the three security concepts of confidentiality, integrity, and availability make up the CIA Triad. It is also sometimes referred to as the AIC Triad.
The altered form of a plaintext message, so as to be unreadable for anyone except the intended recipients. Something that has been turned into a secret.
Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
Provided by mixing (changing) the key values used during the repeated rounds of encryption. When the key is modified for each round, it provides added complexity that the attacker would encounter.
The study of techniques for attempting to defeat cryptographic techniques and, more generally, information security services provided through cryptography.
The science that deals with hidden, disguised, or encrypted communications.
Secret writing. Today provides the ability to achieve confidentiality, integrity, authenticity, non-repudiation, and access control.
The reverse process from encryption. It is the process of converting a ciphertext message back into plaintext through the use of the cryptographic algorithm and the appropriate key that was used to do the original encryption.
Provided by mixing up the location of the plaintext throughout the ciphertext. The strongest algorithms exhibit a high degree of confusion and diffusion.
An electronic document that contains the name of an organization or individual, the business address, the digital signature of the certificate authority issuing the certificate, the certificate holder's public key, a serial number, and the expiration date. Used to bind individuals and entities to their public keys. Issued by a trusted third party referred to as a Certificate Authority (CA).
The reverse process from encoding - converting the encoded message back into its plaintext format.
An electronic document that contains the name of an organization or individual, the business address, the digital signature of the certificate authority issuing the certificate, the certificate holder's public key, a serial number, and the expiration date
Digital rights management (DRM)
A broad range of technologies that grant control and protection to content providers over their own digital media.
Provide authentication of a sender and integrity of a sender's message and non-repudiation services.
The action of changing a message into another format through the use of a code.
The process of converting the message from its plaintext to ciphertext.
Accepts an input message of any length and generates, through a one-way operation, a fixed-length output called a message digest or hash.
Initialization vector (IV)
A non-secret binary vector used as the initializing input algorithm, or a random starting point, for the encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance and to synchronize cryptographic equipment.
Guarding against improper information modification or destruction and includes ensuring information non-repudiation and authenticity.
Key or cryptovariable
The input that controls the operation of the cryptographic algorithm. It determines the behavior of the algorithm and permits the reliable encryption and decryption of the message.
When different encryption keys generate the same ciphertext from the same plaintext message.
The size of a key, usually measured in bits, that a cryptographic algorithm uses in ciphering or deciphering protected information.
Message authentication code (MAC)
A small block of data that is generated using a secret key and then appended to the message, used to address integrity.
A small representation of a larger message.
Message digests are used to ensure the authentication and integrity of information, not the confidentiality.
Inability to deny. In cryptography, a service that ensures the sender cannot deny a message was sent and the integrity of the message is intact, and the receiver cannot claim receiving a different message.
Hiding plaintext within other plaintext. A form of steganography.
The message in its natural format has not been turned into a secret.
Registration authority (RA)
This performs certificate registration services on behalf of a Certificate Authority (CA).
Hiding something within something else, or data hidden within other data.
When a cryptosystem performs its encryption on a bit-by-bit basis.
The process of exchanging one letter or bit for another.
Operate with a single cryptographic key that is used for both encryption and decryption of the message.
The process of reordering the plaintext to hide the message by using the same letters or bits.
Trusted platform module (TPM)
A secure crypto processor and storage module
This represents the time and effort required to break a cryptography system.
THIS SET IS OFTEN IN FOLDERS WITH...
Official (ISC)² CISSP - Domain 1: Security and Ris…
Official (ISC)² CISSP - Domain 2: Asset Security
Official (ISC)² CISSP - Domain 4: Communication an…
Official (ISC)² CISSP - Domain 1 - 4
YOU MIGHT ALSO LIKE...
Principle of Information Security Chapter 8
Principle of Information Security Chapter 8
Info Security Chapter 9
OTHER SETS BY THIS CREATOR
real estate vocab
CCNA CYBER OPS SECOPS 210-255 CHAPTER 5 INTRODUCTI…
CCNA CYBER OPS SECOPS 210-255 CHAPTER 3. FUNDAMENT…
CCNA CYBER OPS SECOPS 210-255 CHAPTER 2. FORENSICS…