1 | 15 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3/14 | 17 | ||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
16 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
13 |
1. The process of converting plaintext into ciphertext using an encryption algorithm and a key.
2. The process of invalidating a digital certificate before its expiration date.
3. An electronic document that confirms the credibility of a sender or receiver in a network communication.
4. The process of converting ciphertext into plaintext using a decryption algorithm and a key.
5. A cryptographic system that uses the same key for both encryption and decryption.
6. The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements.
7. The process of verifying that a network operates efficiently and satisfies the intended performance standards.
8. It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network.
9. The process of securely exchanging keys between parties in asymmetric encryption.
10. The process of verifying the identity of a user by requiring them to provide a password.
11. A piece of information used to authenticate a user's identity, such as a password or biometric data.
12. Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication.
13. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.
14. A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents.
15. In asymmetric encryption, a key that is kept secret and used for decryption.
16. An organization that issues digital certificates and verifies the authenticity of entities.
17. Information used to authenticate a user's identity, typically consisting of a username and password.