Security Awareness Chapter 6

Your page rank:

Total word count: 638
Pages: 2

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

algorithm

procedures based on a mathematical formula used to encrypt and decrypt the data

asymmetric cryptographic algorithm

cryptography that uses two mathematically related keys

ciphertext

data that has been encrypted

cleartext

unencrypted data

cryptography

the science of transforming information into a secure form so that unauthorized persons cannot access it

data broker

organization that aggregates user data and then sells it to interested third parties

decryption

the process of changing ciphertext in to plaintext

digital certificate

a technology used to associate a user’s identity to a public key and that has been "digitally signed" by a trusted third party

digest

the unique digital fingerprint created by a one-way hash algorithm

digital signature

an electronic verification of the sender

encryption

the process of changing plaintext into ciphertext

hash

an algorithm that creates a unique digital fingerprint

key

a mathematical value entered in to a cryptographic algorithm to produce encrypted data

nonrepudiation

the process of proving that a user performed an action

plaintext

cleartext data that is to be encrypted and decrypted by a cryptographic algorithm

privacy

the state or condition of being free from public attention to the degree that the user chooses

private key

an asymmetric encryption key that does have to be protected

private key cryptography

cryptography algorithms that use a single key to encrypt and decrypt a message

public key

an asymmetric encryption key that does not have to be protected

public key cryptography

cryptography that uses two mathematically related keys

steganography

hiding the existence of data within another type of file

symmetric cryptographic algorithm

encryption that uses a single key to encrypt and decrypt a message

Each of the following is true about privacy EXCEPT:

Today individuals can achieve any level of privacy that is desired

Which of the following is not a risk associated with the use of private data?

devices being infected with malware

Which of the following is not an issue raised regarding how private data is gathered and used?

By law, all encrypted data must contain a "backdoor" entry point

___ hides the existence of the data

Steganography

What is ciphertext?

Encrypted data

Which of the following is "one-way" so that its contents cannot be used to reveal the original set of data?

hash

What is data called that is to be encrypted by inputting it into a cryptographic algorithm?

plaintext

Which of these is NOT a basic security protection for information that cryptography can provide?

risk loss

The areas of a file in which stegography can hide data include all of the following EXCEPT ___

the directory structure of the file system

Proving that a user sent an email message is known as ____

nonrepudiation

A(n) ___ is not decrypted but is only used for comparison purposes

digest

Which of these is NOT a characteristic of the secure hash algorithm?

Collisions should be rare

How many keys are used in asymmetric cryptography?

two

Which of these is not a method for encryption through software?

encrypt using a separate hardware computer chip

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

Alice’s public key

A digital signature can provide each of the following benefits EXCEPT ___

verifying the receiver

What is the most important advantage of hardware encryption over software encryption?

Software that performs encryption can be subject to attacks

Which of the following appears in the web browser when you are connected to a secure website that is using a digital certificate?

padlock

Which of the following is NOT a privacy best practice?

Carry your social security number with you so that it cannot be stolen when you are not home

Each of these is a responsibilitiy of an organization regarding user private data EXCEPT:

keep personal info for no longer than 365 days

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending