Cards (13)

  • Encryption refers to the process of encoding plain-text information with an encryption key.
  • We encrypt stored data, such as passwords kept in a database, and data during transmission, such as websites with HTTPS in the URL to encrypt data you submit to the website.
  • Ethical hacking is the process of utilising techniques in order to gain access to a system with ethical intent. The most common forms of ethical hacking are white-hat hacking and grey-hat hacking.
  • Analysis of system data/behaviours involves overseeing a systems data and users actions to see if poor practices are being followed.
  • Backups should be taken?

    Based on business and its needs
  • Which of the following would count as a remote backup?
    On a separate drive in the same computer no
    In a OneDrive cloud storage server yes
    On a USB stick in a locked safe no
    On a USB stick in another building yes
  • What is cipher text?

    Plain-text after it has been encrypted
  • Why is stored data sometimes encrypted?

    If data is stolen it is still unreadable
  • What are two common vulnerabilities identified by penetration testing?
    Open network ports
    Out of date software
  • What key unencrypts encrypted data?

    Decryption key
  • Draw a flowchart today in prep book of encryption
  • Firewalls and anti-virus software are device hardening methods
  • Having frequent backups is important so you can recover up-to-date data if it is ever lost. Backups should be kept in a remote location.