CompTIA Advanced Security Practitioner

156 cards   |   Total Attempts: 188
  

Related Topics

Cards In This Set

Front Back
Electronic Code Book (ECB)
Is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value and vice versa. In other words, the same plaintext value will always result in the same ciphertext value. Electronic Code Book is used when a volume of plaintext is separated into several blocks of data, each of which is then encrypted independently of other blocks. In fact, Electronic Code Book has the ability to support a separate encryption key for each block type.
Cipher block chaining (CBC)
Is a mode of operation for a block cipher (one in which a sequence of bits are encrypted as a single unit or block with a cipher key applied to the entire block). Cipher block chaining uses what is known as an initialization vector (IV) of a certain length.
Counter (CTR)
The counter has additional properties, including a nonce and initial counter block. The mode does not require padding the plain text to the block size of the cipher.
Cipher Feedback (CFB)
In contrast to the cipher block chaining (CBC) mode, which encrypts a set number of bits of plaintext at a time, it is at times desirable to encrypt and transfer some plaintext values instantly one at a time, for which ciphertext feedback is a method. Like cipher block chaining, ciphertext feedback also makes use of an initialization vector (IV). CFB uses a block cipher as a component of a random number generator. In CFB mode, the previous ciphertext block is encrypted and the output is XORed (see XOR) with the current plaintext block to create the current ciphertext block. The XOR operation conceals plaintext patterns. Plaintext cannot be directly worked on unless there is retrieval of blocks from either the beginning or end of the ciphertext.
Output Feedback (OFB)
It has some similarities to the ciphertext feedback mode in that it permits encryption of differing block sizes, but has the key difference that the output of the encryption block function is the feedback (instead of the ciphertext). The XOR (exclusive OR) value of each plaintext block is created independently of both the plaintext and ciphertext. It is this mode that is used when there can be no tolerance for error propagation, as there are no chaining dependencies. Like the ciphertext feedback mode, it uses an initialization vector (IV). Changing the IV in the same plaintext block results in different ciphertext.
Software as a Service
A software distribution model in which a third-party provider hosts applications and makes them available to customers over the Internet.
Platform as a Service
A category of cloud computing services that provides a platform allowing customers to develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.
Infrastructure as a Service
A form of cloud computing that provides virtualized computing resources over the Internet
Public Cloud Computing
One based on the standard cloud computing model, in which a service provider makes resources, such as applications and storage, available to the general public over the Internet
Private Cloud Computing
A type of cloud computing that delivers similar advantages to public cloud, including scalability and self-service, but through a proprietary architecture. Unlike public clouds, which deliver services to multiple organizations, a private cloud is dedicated to a single organization
Hybrid Cloud Computing
A cloud computing environment which uses a mix of on-premises, private cloud and third-party, public cloud services with orchestration between the two platforms.
Hyperjacking
An attack in which a hacker takes malicious control over the hypervisor that creates the virtual environment within a virtual machine (VM) host.
VM escape
The process of breaking out of a virtual machine, virtual machining and interacting with the host operating system.
Type 1 Hypervisor
Type 1, which is considered a bare-metal hypervisor and runs directly on top of hardware. The Type 1 hypervisor is often referred to as a hardware virtualization engine.
Type 2 Hypervisor
Type 2, which operates as an application on top of an existing operating system.