2.1.1 - 2.1.2 Notes Flashcards
the unauthorized access or retrieval of confidential or protected data
data breach
a wireless access point that give unauthorized access to secure networks
rogue access point
science and art of delivering a message securely and confidentially
cryptography
a cipher in which each letter in an alphabet is replaced with a different character or symbol
substitution cipher
a string of characters used as a parameter that determines the output of an encryption algorithm
key
an encryption method where the sender and receiver share a private key to use the encryption algorithm
private key encryption
also called shared key encryption, a process in which a single key is used in both the encryption and decryption algorithm to encode/decode data
symmetric key
a method of paired key encryption in which the key used to encrypt data is made available to anybody and its corresponding decryption key is secret
public key encryption
two keys that are related in such a way that one can be used to encrypt data, which can then only be decoded by the other key
paired keys
also called public key encryption, an encryption method that uses two keys: a public and private one, belong to one owner
asymmetric encryption
an example of public key encryption developed by Rivest, Shamir, and Adelman, the founders of RSA, an American computer/network security company
RSA algorithm
digital document used to verify the authenticity of a server or public key
SSl certificate
confirm you identity using knowledge only known to you
authenticates
information about individuals that can be used to trace a person’s identity
PII (Personally Identifiable Information)
small text-based bits of information about your browser that a web server saves
cookies