CIA triad

NIST

non-repudiation

A cryptographic algorithm is the particular operation performed to encode or decode data.

symmetric and asymmetric algorithm types

plaintext

Cipher text encrypted message.

algorithm process used to encrypt and decrypt

Cryptoanalysis is the art of cracking cryptographic systems

Aes advanced encryption 128

AES 256

asymmetric encryption

two different but related public and private keys in a key pair

RSA 2048

ECC 3072

the Hashing algorithm produces a fixed length string of bits from an an input plaintext that can be of any length output can be referred to as a hash or as a message digest (one way)

secure hash algorithm

message digest algorithm

Each CA issues itself a certificate which is called a root certificate, self-signed can be used to sign other certificates signed by the ca

CSR certificate signing requests

read this cyrptoprocessor and secure enclaves

a key generation system with a hugh degree of disorder or entropy

trusted platform module

hardware seucirty module https://en.wikipedia.org/wiki/Hardwaresecuritymodule

key escrow escrow means that something is held independtly

data at rest usb

data in trainsit motion dation trasmitted to a netowkr

data in use state data in system ram or cpu register and cache

RAID ARRAY

TLS IPSAC WPA

SALTING PASSWORD

KEY STRETCHING

OBFUSCATION

STEGNAGROPHY HIDDEN WRITTEN, EMBED INFORMATION INSIDE AN UNEXPECTED SOURCE

DATA MASKING

IS TOKENIZATION IRREVERSIBLE https://en.wikipedia.org/wiki/Loadbalancing(computing)

https://cloud.google.com/load-balancing/docs/choosing-load-balancer