1 | 16 | |||||||||||||||||||||||
2 | 18 | |||||||||||||||||||||||
3 | ||||||||||||||||||||||||
4 | ||||||||||||||||||||||||
5 | 19 | |||||||||||||||||||||||
6/15 | ||||||||||||||||||||||||
8 | 7 | 17 | ||||||||||||||||||||||
9 | ||||||||||||||||||||||||
10 | ||||||||||||||||||||||||
11 | ||||||||||||||||||||||||
12 | ||||||||||||||||||||||||
13 | ||||||||||||||||||||||||
14 | ||||||||||||||||||||||||
1. A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents.
2. In asymmetric encryption, a key that is publicly available and used for encryption.
3. A cryptographic system that uses the same key for both encryption and decryption.
4. In asymmetric encryption, a key that is kept secret and used for decryption.
5. An electronic document that confirms the credibility of a sender or receiver in a network communication.
6. The process of invalidating a digital certificate before its expiration date.
7. A network security device that employs predetermined security rules to filter and regulate incoming and outgoing network traffic.
8. A pair of cryptographic keys, consisting of a public key and a private key.
9. The process of verifying that a network operates efficiently and satisfies the intended performance standards.
10. A fraudulent attempt to obtain sensitive information, such as passwords, by disguising as a trustworthy entity.
11. The process of verifying the identity of a user by requiring them to provide a password.
12. It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network.
13. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.
14. A piece of information used to authenticate a user's identity, such as a password or biometric data.
15. Information used to authenticate a user's identity, typically consisting of a username and password.
16. The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements.
17. The act of confirming the identity of a user or device, with the purpose of granting access to a network or system.
18. The process of converting ciphertext into plaintext using a decryption algorithm and a key.
19. The process of securely exchanging keys between parties in asymmetric encryption.