Encryption refers to the process of encoding plain-text information with an encryption key.
We encrypt stored data, such as passwords kept in a database, and data during transmission, such as websites with HTTPS in the URL to encrypt data you submit to the website.
Ethical hacking is the process of utilising techniques in order to gain access to a system with ethical intent. The most common forms of ethical hacking are white-hat hacking and grey-hat hacking.
Analysis of system data/behaviours involves overseeing a systems data and users actions to see if poor practices are being followed.
Backups should be taken?
Based on business and its needs
Which of the following would count as a remote backup?
On a separate drive in the same computer no
In a OneDrive cloud storage server yes
On a USB stick in a locked safe no
On a USB stick in another building yes
What is cipher text?
Plain-text after it has been encrypted
Why is stored data sometimes encrypted?
If data is stolen it is still unreadable
What are two common vulnerabilities identified by penetration testing?
Open network ports
Out of date software
What key unencrypts encrypted data?
Decryption key
Draw a flowchart today in prep book of encryption
Firewalls and anti-virus software are device hardening methods
Having frequent backups is important so you can recover up-to-date data if it is ever lost. Backups should be kept in a remote location.