1 | 15 | 17 | |||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | 16 | ||||||||||||||||||||||||
18 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
14 | 8 | ||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
1. The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements.
2. A fraudulent attempt to obtain sensitive information, such as passwords, by disguising as a trustworthy entity.
3. The process of verifying the identity of a user by requiring them to provide a password.
4. Information used to authenticate a user's identity, typically consisting of a username and password.
5. In asymmetric encryption, a key that is kept secret and used for decryption.
6. The process of converting ciphertext into plaintext using a decryption algorithm and a key.
7. The process of invalidating a digital certificate before its expiration date.
8. The act of confirming the identity of a user or device, with the purpose of granting access to a network or system.
9. In asymmetric encryption, a key that is publicly available and used for encryption.
10. The process of verifying that a network operates efficiently and satisfies the intended performance standards.
11. An organization that issues digital certificates and verifies the authenticity of entities.
12. An electronic document that confirms the credibility of a sender or receiver in a network communication.
13. A cryptographic system that uses the same key for both encryption and decryption.
14. It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network.
15. A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents.
16. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.
17. The process of converting a password into a fixed-length string of characters using a cryptographic algorithm.
18. A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption.