• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back
virtual private network
private communication channels, often referred to as tunnels, which are accessible only to those parties possessing the appropriate encryption and decryption keys
digital certificate
electronic document that contains an entity's public key, certifies the identity of the owner of that particular public key, issued by certificate authority
digital signature
has of a document, using document creators key, provides proof that a document has not been altered, and of the creator of the document
encryption
preventative control, process of transforming normal content called plaintext, into unreadable gibberish, decryption reverses this process
key length
number of bits (characters) used to convert text into blocks 256 is common
algorithm
manner in which key and text is combined to create scrambled text
policies concerning encryption keys
stored securely with strong access codes
symmetric
one key used to both encrypt and decrypt fast but vulnerable
asymmetric
different key used to encrypt that to decrypt very secure but very slow
hybrid solution
use symmetric for encrypting information, and use asymmetric for encrypting symmetric key for decryption