1/2 | 14 | ||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 |
1. The act of confirming the identity of a user or device, with the purpose of granting access to a network or system.
2. A piece of information used to authenticate a user's identity, such as a password or biometric data.
3. The process of verifying the identity of a user by requiring them to provide a password.
4. A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption.
5. Information used to authenticate a user's identity, typically consisting of a username and password.
6. The process of securely exchanging keys between parties in asymmetric encryption.
7. The process of invalidating a digital certificate before its expiration date.
8. An electronic document that confirms the credibility of a sender or receiver in a network communication.
9. The process of converting ciphertext into plaintext using a decryption algorithm and a key.
10. It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network.
11. Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication.
12. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.
13. The process of verifying that a network operates efficiently and satisfies the intended performance standards.
14. An organization that issues digital certificates and verifies the authenticity of entities.