Chapter 4 - Security Flashcards
Asymmetric key encryption
Encryption system in which 2 keys are used: a public key to encrypt data and a private key to decrypt it.
Backdoor
Method of bypassing security in a system, built in by the system designers.
Biometric Enrolment
Process of registering users for biometric systems by taking initial samples.
Biometric Template
Measurements taken from a biometric sample.
Botnet
Group of zombie computers under the control of a criminal.
Brute Force Attack
Attempt to break a password by trying all possible combinations of letters, numbers and symbols.
Certificate Authority
Organisation that issues digital certificates to individuals and companies.
Ciphertext
Result of encrypting plaintext
Computer Misuse Act
UK law governing criminal offences committed using a computer.
Dictionary Attack
Attempt of breaking in by trying all possible words.
DDoS
Distributed Denial of Service Attack
Denial of service attack committed using dozens of computers, usually zombie computers on a bonnet.
DNS poisoning
Technique used by criminals to alter DNS records and drive users to fake sites, to commit phishing.
EV SSL
Extended Validation SSL. Digital certificate validation technique used on the World Wide Web.
Key escrow
Idea of having encryption keys stored by third party companies so that the government can access them if needed.
Key pair
A public and private key that work together in a public encryption system.