4.6 Flashcards
Data – – – – – – – is most secure when it is stored on voice to protect my firewall anti-malware software and physical security
At rest
Data – – – – to be used yes must be accessible with rings inherent risk
Data in US
This is when Dadtz is most of our normal especially when Dad and Rose leave your own trash in at work is it supposed to multitude of potential gabs intrusion and weak links
Tara emotion
That is a Cryptid using a single key that only the sender and the receiver no. This is also known as symmetric Encryption
Private key encryption
There is encrypted with a private Keynote only to the user and his decrypted with a mathematically related public key that can be available through third party source such as a public key server
Public key encryption or asymmetric encryption
This is a small file containing the users verified identification information and users public key
Digital certificate
Digital certificates is issued maintained and validated by an organization called
Certificate authority
Do use certificate authorities to associate pokies was certain users is known as
Public-key infrastructure
This involves a process of ensuring that a user device or application is who they say they are
Authentication
This is an encryption protocol suite that defines a rules for encryption authentication and key management for TCP/IP transmissions . It’s an enhancement to IPV4 and it’s native to IPV6. It works at the network layer of the OSI model and add security information to the header
Ip Sec
189
189