1 | 14 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
4/5 | |||||||||||||||||||||||||
6 | 15 | ||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
1. A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption.
2. A cryptographic system that uses the same key for both encryption and decryption.
3. The process of converting ciphertext into plaintext using a decryption algorithm and a key.
4. The act of confirming the identity of a user or device, with the purpose of granting access to a network or system.
5. A piece of information used to authenticate a user's identity, such as a password or biometric data.
6. It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network.
7. An organization that issues digital certificates and verifies the authenticity of entities.
8. The process of verifying that a network operates efficiently and satisfies the intended performance standards.
9. In asymmetric encryption, a key that is kept secret and used for decryption.
10. An electronic document that confirms the credibility of a sender or receiver in a network communication.
11. A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents.
12. Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication.
13. In asymmetric encryption, a key that is publicly available and used for encryption.
14. Information used to authenticate a user's identity, typically consisting of a username and password.
15. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.