1 | 11 | ||||||||||||||||||||
2 | |||||||||||||||||||||
3 | |||||||||||||||||||||
4 | |||||||||||||||||||||
12 | |||||||||||||||||||||
5 | |||||||||||||||||||||
6 | |||||||||||||||||||||
7 | |||||||||||||||||||||
8 | |||||||||||||||||||||
9 | |||||||||||||||||||||
10 | |||||||||||||||||||||
1. The process of recovering passwords from data that has been stored or transmitted in an encrypted or hashed form.
2. A security feature that locks a user's account after a specified number of failed authentication attempts.
3. A type of encryption where the order of letters in the plaintext is rearranged
4. The study of analyzing and breaking encryption schemes
5. A type of encryption where each letter in the plaintext is replaced by a different letter or symbol
6. A precomputed table used in password cracking to reverse cryptographic hash functions and quickly determine the original password.
7. The encrypted form of a plaintext message
8. A technique used in cryptanalysis to analyze the frequency of letters or symbols in a ciphertext
9. A measure of the effectiveness of a password in resisting unauthorized access.
10. A method used in cryptography to try all possible combinations until the correct one is found
11. A type of attack where the cryptanalyst has access to both the plaintext and its corresponding ciphertext
12. A method of attempting to gain unauthorized access to a system by systematically attempting all possible combinations of words from a dictionary as passwords.