The CSI Case Management System is about to be released. The courses will be updated to match the update.
K |
|---|
KernelThe core component of an operating system responsible for managing CPU scheduling, memory allocation, device drivers, and system calls. The kernel operates in privileged mode and controls low-level hardware access. | |
Key Derivation Function (KDF)A function that derives one or more cryptographic keys from a secret (such as a password or master key). KDFs are used for generating keys of appropriate length and for deriving separate keys for different purposes from a single root secret. | |
Key EscrowA system where encryption keys are stored with a third party (or split among parties) so that authorized recovery is possible. Key escrow can support business continuity and lawful access processes but introduces central points of risk and governance challenges. | |
Key ExchangeA method for establishing a shared secret between parties, typically over an untrusted network. Key exchange is foundational to secure protocols (like TLS) and commonly uses Diffie-Hellman or Elliptic Curve Diffie-Hellman (ECDH). | |
Key LengthThe size of a cryptographic key, measured in bits. Longer keys generally increase resistance to brute-force attacks. Practical security also depends on algorithm design, implementation quality, and operational key management. | |
Key ManagementThe processes and controls used to generate, store, distribute, rotate, revoke, and destroy cryptographic keys. Weak key management can compromise strong cryptography, and is a common cause of real-world failures. | |
Key RevocationThe process of invalidating a key or certificate before its normal expiration, usually due to suspected compromise, misuse, or decommissioning. Revocation is critical to prevent continued trust in compromised keys. | |
Key RotationThe planned replacement of cryptographic keys to reduce risk if a key is compromised and to limit the amount of data protected by a single key. Rotation schedules depend on sensitivity, usage frequency, and threat model. | |
KubernetesAn open-source container orchestration platform that automates deployment, scaling, and management of containerized applications. | |