1 | 17 | ||||||||||||||||||||||||
2 | 19 | ||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
16 | 18 | ||||||||||||||||||||||||
4 | 5 | ||||||||||||||||||||||||
15 | 6 | ||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
13 | 12 | ||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
1. A piece of information used to authenticate a user's identity, such as a password or biometric data.
2. In asymmetric encryption, a key that is publicly available and used for encryption.
3. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.
4. The process of converting ciphertext into plaintext using a decryption algorithm and a key.
5. In asymmetric encryption, a key that is kept secret and used for decryption.
6. A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents.
7. The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements.
8. A network security device that employs predetermined security rules to filter and regulate incoming and outgoing network traffic.
9. The process of converting plaintext into ciphertext using an encryption algorithm and a key.
10. The process of verifying that a network operates efficiently and satisfies the intended performance standards.
11. The process of securely exchanging keys between parties in asymmetric encryption.
12. It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network.
13. A fraudulent attempt to obtain sensitive information, such as passwords, by disguising as a trustworthy entity.
14. A pair of cryptographic keys, consisting of a public key and a private key.
15. The process of converting a password into a fixed-length string of characters using a cryptographic algorithm.
16. An organization that issues digital certificates and verifies the authenticity of entities.
17. Information used to authenticate a user's identity, typically consisting of a username and password.
18. An electronic document that confirms the credibility of a sender or receiver in a network communication.
19. A cryptographic system that uses the same key for both encryption and decryption.