1 | 15 | ||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
16 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | 8 | ||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 |
1. The process of invalidating a digital certificate before its expiration date.
2. The process of identifying and assessing security vulnerabilities in a network infrastructure to address and mitigate potential risks.
3. A security protocol for wireless networks that provides data confidentiality and access control mechanisms.
4. A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources.
5. Information used to authenticate a user's identity, typically consisting of a username and password.
6. The process of verifying the identity of a user by requiring them to provide a password.
7. A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption.
8. A cryptographic system that uses the same key for both encryption and decryption.
9. An IPsec configuration where the entire IP packet is encapsulated within another IP packet for secure communication between networks.
10. The process of converting plaintext data into an unreadable form to protect it from unauthorized access or theft.
11. An IPsec configuration where only the payload of the IP packet is encrypted and authenticated, while the original IP header remains intact.
12. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.
13. A set of security parameters negotiated between two IPsec peers for secure communication, including encryption algorithm, integrity algorithm, and keys.
14. The process of securely exchanging keys between parties in asymmetric encryption.
15. A secure network connection that allows remote users to access a private network over the internet securely.
16. The process of dividing a computer network into smaller subnetworks for improved security and performance.