Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
virtual private network
|
private communication channels, often referred to as tunnels, which are accessible only to those parties possessing the appropriate encryption and decryption keys
|
|
digital certificate
|
electronic document that contains an entity's public key, certifies the identity of the owner of that particular public key, issued by certificate authority
|
|
digital signature
|
has of a document, using document creators key, provides proof that a document has not been altered, and of the creator of the document
|
|
encryption
|
preventative control, process of transforming normal content called plaintext, into unreadable gibberish, decryption reverses this process
|
|
key length
|
number of bits (characters) used to convert text into blocks 256 is common
|
|
algorithm
|
manner in which key and text is combined to create scrambled text
|
|
policies concerning encryption keys
|
stored securely with strong access codes
|
|
symmetric
|
one key used to both encrypt and decrypt fast but vulnerable
|
|
asymmetric
|
different key used to encrypt that to decrypt very secure but very slow
|
|
hybrid solution
|
use symmetric for encrypting information, and use asymmetric for encrypting symmetric key for decryption
|