Cards (13)

    • Encryption refers to the process of encoding plain-text information with an encryption key.
    • We encrypt stored data, such as passwords kept in a database, and data during transmission, such as websites with HTTPS in the URL to encrypt data you submit to the website.
    • Ethical hacking is the process of utilising techniques in order to gain access to a system with ethical intent. The most common forms of ethical hacking are white-hat hacking and grey-hat hacking.
    • Analysis of system data/behaviours involves overseeing a systems data and users actions to see if poor practices are being followed.
    • Backups should be taken?

      Based on business and its needs
    • Which of the following would count as a remote backup?
      On a separate drive in the same computer no
      In a OneDrive cloud storage server yes
      On a USB stick in a locked safe no
      On a USB stick in another building yes
    • What is cipher text?

      Plain-text after it has been encrypted
    • Why is stored data sometimes encrypted?

      If data is stolen it is still unreadable
    • What are two common vulnerabilities identified by penetration testing?
      Open network ports
      Out of date software
    • What key unencrypts encrypted data?

      Decryption key
    • Draw a flowchart today in prep book of encryption
    • Firewalls and anti-virus software are device hardening methods
    • Having frequent backups is important so you can recover up-to-date data if it is ever lost. Backups should be kept in a remote location.