__________ in simplest terms is changing plaintext into ciphertext; __________ is the process of changing it back. - Encryption; decryption, Encryption should be applied to information you want to protect __ ___ as well as __ ____. - at rest; in transit., You can use _______ to encrypt individual files. - Aescrypt, You can use _____ or _____ to encrypt full disks. - Bitlocker or FileVault, ______ code or substitution is where a single mapping from our alphabet to a cipher alphabet is created. - Mono-alphabetic, Many early cryptosystems used this. - Mono-alphabetic, Polyalphabetic refers to the mapping of our alphabet to a number of cipher alphabets. - Polyalphabetic, _______ is considered to be unbreakable since it only uses its cipher code once. - One-time pad, This method repeats the random numbers after a given time (periodic). They are fast and are also deterministic and are useful in producing a repeatable set of random numbers. - Pseudo-Random Number Generators (PRNGs)., This method generates a true random number and uses some form of random process. Monitor the movements of a mouse pointer on a screen or from the pauses between keystrokes. Slow method, non-deterministic and aperiodic. - True Random Number Generators (TRNGs)., ____ ______ is a cipher cracking methodology that involves identifying patterns and variations in the probability of codes. i.e. a three-letter ciphered text combination spotted at the beginning of a string too often could tip us off that those three letters correlate the letters THE in the English alphabet. - Frequency Analysis, _______ measures level of unpredictability; in encryption relates to the degree of uncertainty of the encryption process.➢ Two common binary to characters encoding methods are ASCII (8-bit values, up to 256 characters) and UTF-16 (16- bit values, up to 65,536 characters). - Entropy, Hardware encryption is more efficient than software encryption - Hardware vs Software encryption., A tamper-evident and intrusion-resistant physical device that safeguards and manages cryptographic keys and provides cryptographic processing. - hardware security module (HSM), A dedicated processor that handles hardware-level encryption; allows the use of full disk encryption on a hard drive in a manner that minimizes the impact on system performance. TPM contains the encryption keys. - trusted platform module (TPM),

Leaderboard

Flash cards is an open-ended template. It does not generate scores for a leaderboard.

Visual style

Options

Switch template

Continue editing: ?