Security & Encryption ( vocab)

Cards (17)

  • Asymmetric Encryption = A type of cryptographic based on algorithms that require two keys -- one of which is secret (or private) and one of which is public (freely known to others).
  • Caesar Cipher = An encoding technique that shifts letters of the alphabet by a fixed amount.
  • Character frequency analysis = A system of decrypting letter substitution encryptions that is based upon the likely occurrence of various letters in a message. The distribution of letters is roughly the same for almost all samples of a language. In English, ETAOIN SHRDLU are the most commonly used letters
  • Cipher = The generic term for a technique (or algorithm) that performs encryption
  • Cracking encryption = When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption.
  • Decryption = Reversing the encryption process to reveal the original message.
  • Encryption = A process of encoding messages to keep them secret, so only "authorized" parties can read it.
  • Locks and keys = Common terms for encryption and decryption algorithms.
  • Private key = The key that is used to decrypt a message with Asymmetric Encryption.
  • Public key = A value that can be used to encrypt a message with Asymmetric Encryption. This value is available to everyone.  It can be used by ANYONE to encrypt a message.
  • Public key encryption  = An application of asymmetric encryption in which a person "publishes" their public key so that anyone can encrypt a message that only they can decrypt
  • Random Substitution Cipher = An encryption technique that maps each letter of the alphabet to a chosen other letters of the alphabet.
  • Vigenere cipher = A method of encrypting text by applying a series of Caesar ciphers based on the letters of a keyword
  • DDos Attack (distributed denial-of-service)  = A cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by disrupting the services running on that machine.
  • Malware attacks = Any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising
  • Phishing = An attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by pretending to be a trustworthy entity.
  • Virus = A piece of code that is capable of replicating itself and corrupting files across a hard drive and other machines on the network.  Typically is has a detrimental effect, such as corrupting the system or destroying data.