This class was created by Brainscape user Jason Swift. Visit their profile to learn more about the creator.

Decks in this class (19)

CIA Triad and Access Control
Define access control,
Define confidentiality,
Define integrity
21  cards
Introduction to Encryption
Define encryption,
Define cryptography,
Define steganography
15  cards
Symmetric Encryption Introduction
What is the most famous and earli...,
What are the 5 components needed ...,
What is the relationship between ...
5  cards
Symmetric Encryption: Substitution
What are the 4 types of substitut...,
Define mono alphabetic cipher,
Why is mono alphabetic substituti...
18  cards
Symmetric Encryption: Block Ciphers
Give an explanation of block ciphers,
What size is the output cipher text,
What are the 3 main block ciphers...
15  cards
Symmetric Encryption: Stream Ciphers
Explain how a stream cipher works,
What operation if performed to en...
2  cards
Asymmetric Encryption Introduction
Explain how a hash function works,
What are the 2 main desirable pro...,
What does it mean for a hash func...
7  cards
RSA : The Process
What type of cipher is rsa,
Why is rsa so secure,
What is the standard key length u...
4  cards
RSA : Overview
Why is the rsa currently consider...,
Define factoring,
Rsa pros
4  cards
Message Integrity : Hash Functions
Explain how hash functions are us...,
What is a potential issue with ha...,
What happens is even 1 byte of th...
8  cards
Key Management : Symmetric Key Exchange
Why do we use asymmetric encrypti...,
Explain the process of the symmet...
2  cards
Public Key Infrastructure
Define the pki,
Can ca s in the pki be structured...,
Define a certificate
12  cards
Digital Signatures
What 2 problems does public key e...,
What is the formula to calculate ...,
What problem does digital signatu...
7  cards
Privacy
Define security,
Define privacy,
What is gdpr
15  cards
Designing a Security Protocol
What is the goal of designing a s...,
What are the 4 assumptions that n...,
Define attempt 1 what are the iss...
10  cards
Formal Model, AVT, Alice and Bob
What is the goal of a formal model,
What is an automated verification...,
Why are avt s initially undecidable
9  cards
SSDLC and Security Assessment
Why is modern software hard to de...,
What is the software maintenance ...,
What are the 7 steps of sap s sec...
9  cards
Security Testing
Define security testing,
What are the 2 types of testing d...,
Define how each type of testing i...
17  cards
Threat Modelling
When is thread modelling conducted,
Are security measures implemented...,
What are the 4 questions asked wh...
11  cards

More about
Computer Security

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Jason Swift's Computer Security flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Computer Security
  • 10 decks
  • 237 flashcards
  • 1 learners
Decks: X86 Theory, Buffer Overflow Theory, Format String Theory, And more!
Security+ Exam
  • 34 decks
  • 787 flashcards
  • 4 learners
Decks: Section 1 Overview To Security, Section 2 Malware, Section 3 Malware Infections, And more!
CS 115 Computer Science
  • 30 decks
  • 997 flashcards
  • 764 learners
Decks: Chapter 1 Checkpoint, Chapter 1 Notes Pt 1, Chapter 1 Notes Pt 2, And more!
Make Flashcards