1 | 13 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
10 | 4 | ||||||||||||||||||||||||
12 | 14 | ||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
1. A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents.
2. A cryptographic system that uses the same key for both encryption and decryption.
3. A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption.
4. The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements.
5. A piece of information used to authenticate a user's identity, such as a password or biometric data.
6. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.
7. The process of invalidating a digital certificate before its expiration date.
8. An organization that issues digital certificates and verifies the authenticity of entities.
9. The act of confirming the identity of a user or device, with the purpose of granting access to a network or system.
10. An electronic document that confirms the credibility of a sender or receiver in a network communication.
11. It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network.
12. The process of verifying that a network operates efficiently and satisfies the intended performance standards.
13. The process of converting plaintext into ciphertext using an encryption algorithm and a key.
14. Information used to authenticate a user's identity, typically consisting of a username and password.