INFOS SUMMARY Flashcards

1
Q

what is data?

A

facts collected, recorded and stored in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is information?

A

meaningful and organized data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

uses for IT?

A

helps decision makers more effectively filter and condense info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

when is info valuable?

A

when benefits exceed costs of gathering, storing, maintaining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what makes info useful?

A
  • relevant
  • reliable
  • complete
  • timely
  • understandable
  • verifiable
  • accessible
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are business processes?

A

activities and tasks performed to achieve specific organisational goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a business transaction?

A

an agreement between two entities to exchange g/s/other that can be measured in economic terms by the entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is transaction processing?

A

when transactional data is used to create FS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a basic bus process?

A

transactions betw the bus and third parties:

  • revenue cycle (give g/s = get cash)
  • expenditure cycle (get g/s = give cash)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is an AIS?

A

a system that collects, records, stores and processes data to produce info for decision makers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

components of an AIS?

A
  • people who use it
  • processes
  • technology
  • controls to safeguard info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how does an AIS add value to an org?

A
  • improving quality and reduce service costs
  • improves efficiency
  • improves decision making
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a strategy?

A

the overall goal the org hopes to acheive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what does a value chain do?

A

it links together diff activities within an org that provide value to the customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

primary value chain activities?

A

provide direct value to the customer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

value chain support activities?

A

enable primary activities to be efficient and effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is a data processing cycle?

A

demonstrates the operations performed on data to make the info meaningful for decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what triggers data processing?

A

a business activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

four components of data processing cycle

A

storage
^
input > processing > info output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

what forms part of (1) data input?

A

data collection/preparation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

what forms part of (2) data processing?

A
  • editing
  • correction
  • manipulation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

what data must be collected when a bus activity is initiated?

A
  • activity type
  • resources affected by the activity
  • people who took part in it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what is data collection?

A

process which ensures that data are both defined and accurate so that decisions can be valid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

what is data preparation?

A

manipulation of data into a form more suitable for analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

what happens during data input?

A

verified data is conv into machine-readable form so that it can be processed. time consuming and requires speed and accuracy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

what is a turnaround document?

A

(source document)

takes output to an external party who returns the output back to the company as an input (after adding things)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

what is a transaction processing system?

A

IS that processes data generated from bus transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what are the objectives of a TPS?

A
  • carries out day-to-day transactions
  • supplies necessary info to orgs that enables business functions
  • supplies data to other IS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

what is a transaction?

A

a business event that modifies/generates data stored in an IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

TPS characteristics?

A
  • rapid processing (info available when needed speedily)
  • processing reliability
  • controlled access
  • must be efficient and meet ACID requirements
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

what are the ACID requirements?

A

Atomicity (complete)
Consistency (valid according to rules)
Isolation
Durability (can’t be undone)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

what is the design of a TPS based on?

A
  • data content and format
  • execution details of transactions
  • rules to be enforced
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

what are TPSs capable of?

A
  • enforcing rules and work procedures
  • detecting errors/missing data
  • automating certain dec-mak functions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

what are the four types of data processing?

A

C reating new records
R eading existing data
U pdating previous records / data
D eleting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

methods of data processing?

A

batch processing
online real-time processing
online batch processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

adv of batch processing?

A
  • cheaper
  • can manage large repeated work easily
  • sharing of batch system for multiple users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

disadv of batch processing?

A
  • time delays (you can’t do anything while it’s processing)

- difficult to debug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

how does real-time processing work?

A

comp sys processes data immediately after capture and provides updated info to users on a timely basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

adv of real-time processing?

A
  • accessible
  • cost savings
  • service improves dramatically
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

disadv of real-time processing?

A
  • servers must always be online (expensive bc of resources and processing time)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

what is data storage?

A

an important stage in the cycle where data are held for future usage. allows for quicker access to processed info so that it can be passed on to the next stage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

what is CBS?

A

computer-based storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

what are attributes (CBS)?

A

facts/properties about an entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

what are data values (CBS)?

A

actual value stored in a field, describing a particular attribute of an entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

what are records (CBS)?

A

a group of fields whose data values describe entity attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

what are fields (CBS)?

A

this is where attributes of an entity are stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

what is the info output stage?

A

the stage where processed info is transmitted to the user (can be viewed online) to be interpreted and given meaning to guide decisons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

what do IS produce output for?

A
  • planning
  • recording/processing transactions
  • monitoring performance
  • controlling
  • dec-mak
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

what is a file?

A

a group of media records of an entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

what is a masterfile?

A

what stores all accumulated info about an org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

what does the transaction file consist of?

A

all bus transactions that occurred during a specific time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

what does an enterprise resource planning system do?

A

integrates activities from the entire org (revenue, exp, production)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

adv of ERPSs?

A

(help MONITOR, CONTROL, AUTOMATE)

  • greater monitoring capabilities for mgmt
  • improved access of control of data
  • increases productivity thru automation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

disadv of ERPSs?

A
  • costly
  • complex
  • lots of time to implement
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

what are some threats to an AIS?

A
  • natural/political disasters
  • software errors/malfunctions of equ
  • un/intentional acts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

what is fraud?

A

any means a person uses to gain an unfair advantage over another
- false statement, material facts which induces victim to act, intends to deceive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

what are the two main categories of fraud?

A
  • misappropriation of assets (theft of comp assets)

- fraudulent financial reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

elements of misappropriation of assets?

A
  • an org’s assets taken through trickery/deceit not force

- the act of asset theft, concealment and conversion must be present

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

when can misappropriation of assets occur?

A
  • before they are recorded in the books (skimming)
  • while A are being held by the org (larcency)
  • during purchasing process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

examples of misappropriation of assets?

A

skimming, larcency, misuse of equ/inv/cash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

what are the three conditions for fraud?

A
  • pressure
  • opportunity
  • rationalization
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

how to prevent and detect fraud?

A
  • make it less likely to occur
  • make it harder to commit
  • improve detection
  • reduce fraud losses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

how to make fraud less likely to occur?

A
  • create a culture of integrity
  • develop and communicate the security policy
  • assign authority for bus obj and hold them accountable for achieving those goals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

how to make fraud difficult to commit?

A
  • strong int controls
  • require independent checks
  • restrict access
  • use encryption / sys authentification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

how to improve fraud detection?

A
  • ext/int audits
  • audit trails of sys transactions
  • install fraud detection software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

how to reduce fraud losses?

A
  • insurance
  • monitor sys activity
  • store backup copies of data files in secure location
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

why do many orgs experience major control failure?

A
  • increased no. of IS = more people accessing info
  • decentralized networks are harder to control than cen
  • wide area networks give cust and supp access to each other’s sys and data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

what are some common business exposures?

A
  • erroneous bookkeeping
  • fraud, cybercrime
  • excessive costs
  • loss of resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

what is a cryptocurrency?

A

a digital/virtual currency that is secured by cryptography so it cannot be counterfeited. many are decentral networks based on blockchain tech. are immune to gov intervention.

70
Q

what is a blockchain used for in cryptocurrency?

A

ensuring the integrity of transactional data

71
Q

uses for cryptocurrency

A
  • prevent fraud
  • verify transaction correctness
  • ensure security
72
Q

what is a blockchain?

A

at type of database that stores data in blocks that are chained together in chronological order. new data entered into a fresh block when it comes in and is chained to previous block.

73
Q

business risk of cryptocurrency?

A
  • not backed by a central party and their value is determined by what market participants place on them. loss in confidence = collapse of trading activities = drop in value
74
Q

cyber risk of cryptocurrency?

A
  • criminals can break into exchanges and drain crypto wallets and infect computers with malware that steals cc
  • cc is highly reliant on unregulated companies that may lack proper int control – more susceptible to fraud and theft
  • can’t recover keys if lost/stolen
75
Q

operational risk of cryptocurrency?

A

access to money in account cannot be restored if keys are lost / stolen

76
Q

regulatory/compliance risk of cryptocurrency?

A

some countries do not allow the use of cc

77
Q

market risk of cryptocurrency?

A

there are liquidity concerns and market may be easily manipulated

78
Q

accounting risks of cryptocurrency?

A
  • not cash/backed by a gov and are thus volatile and have a significant risk of changes in value
  • do not give owners a contractual right/obl to receive cash / financial asset (cannot be considered a financial instrument)
79
Q

why do we need controls?

A
  • to provide assurance that the goals of each bus process are being achieved
  • to mitigate the risk that the entity is exposed to
  • to provide assurance that the comp is in compliance with gov regulations
80
Q

name some basic control concepts?

A
  • input / output
  • processing
  • standard
  • sensor
  • comparator
  • effector
  • feedback/forward
  • ctrl objectives
81
Q

what do feedback loops do?

A

they gather info on the past performance from the output of a system which is then used to govern future performance by adjusting the input

82
Q

what does a negative feedback aim to do?

A

attempt to change the direction of the actual movement of the system to bring it back in line with the plan

83
Q

what does a positive feedback aim to do?

A

will cause a system to repeat or amplify a certain action

84
Q

how does a feedforward ctrl system work?

A

if forecast costs start to rise above budget then action may be prompted on a feedforward principle to prevent such a deviation from ever actually occurring

85
Q

what do int controls aim to do?

A

provide reasonable assurance of:

  • efficient, effective operations
  • reliable FR
  • compliance with laws
86
Q

what are controls framed by?

A
  • what is to be attained

- the means to attain those goals

87
Q

main objectives of controls?

A
  • to safeguard assets
  • to check accuracy & reliability of accounting data
  • promote operation efficiency
88
Q

what is the primary objective of an AIS?

A

to control the org so that it can achieve its objectives

89
Q

functions of internal controls?

A

prevent
detect
correct

90
Q

what are general controls?

A

these are designed to ensure an org’s control environment is stable and well-managed

  • security mgmt
  • IS mgmt
  • IT infrastructure controls
91
Q

what are application controls?

A

pdc transactions with errors and fraud. concerned with data VAC and authorization.

92
Q

what are some general ctrls wthin IT environments?

A
  • org level
  • personnel
  • file security
  • computer facility
    … controls
93
Q

what are the five interrelated components of int control?

A

1) control environment
2) risk assessment
3) control activities
4) info and communication
5) monitoring

94
Q

what is IT governance concerned with?

A
  • IT’s value delivery to the business

- mitigating IT risks

95
Q

what does IT governance involve?

A
  • strategic IT alignment
  • value delivery
  • risk, resource, performance mgmt
96
Q

how does a framework address the issue of control?

A

five key principles:

1) customize bus processes to make an IS that adds value
2) integrates IT and processes
3) applying a single integrated framework
4) applies an approach that results in effective gov and mgmt of IT functions
5) separates governance and management

97
Q

what is the COSO?

A

a private sector group that issued the framework which defines internal controls and provides guidance for evaluating and enhancing control systems

98
Q

what does ERM stand for?

A

enterprise risk management

99
Q

what does the BoD and mgmt use ERM for?

A

to set strategy
identify events that may effect the entity
manage risk
provide assurance the comp achieves its objectives

100
Q

what are the basic principles of ERM?

A
  • comps are formed to create value for owners
  • mgmt must decide how much uncertainty it will accept
  • uncertainty = risk = negatively effects ability to create value or opportunity = positive effects
  • ERM manages uncertainty = can create/preserve value
101
Q

what are the kinds of objectives of ERM?

A
  • strategic
  • operational
  • reporting
  • compliance
102
Q

strategic obj of ERM?

A

should provide assurance that the board is informed of the progress on the achievement of bus goals

103
Q

operational obj of ERM?

A

provide a guide for org to reach operational goals = effective use of resources

104
Q

reporting obj of ERM?

A

ensures continued flow of capital to meet strategic obj

105
Q

what does the internal environment consist of?

A
mgmt philosophy, operating style, risk appetite
commitment to integrity, ethical values
organizing structure
methods of assigning authority
HR standards
106
Q

how does ERM ensure objective setting?

A

it ensures there is a plan in place to formulate objectives that support the comp mission and consistent with their risk tolerance

107
Q

what is event identification?

A

identify risks or factors that prevent an org from achieving goals

108
Q

what is risk severity = to?

A

risk prob x risk impact

109
Q

how do we assess risk?

A

in terms of potential impact and probability

110
Q

monitoring in ERM?

A

can recommend any changes to the ERM

aims to ensure ERM program functions as designed

111
Q

five components of the COSO ERM frmwrk?

A
  • gov and culture
  • strategy/obj setting
  • performance
  • review and revision
  • info, comm, reporting
112
Q

governance and culture in COSO ERM?

A

forms basis of other components by providing on board oversight resp, operating structure, leadership tone

113
Q

strategy/obj setting in COSO ERM?

A

focuses on strategic planning and how the org can assess risk. provides guidance on risk appetite and forming obj

114
Q

performance in COSO ERM?

A

guides org identifies and assesses risk after developing a strategy and how to respond to risk

115
Q

review and revision in COSO ERM?

A

opportunity to see how the ERM can be improved

116
Q

info, comm, reporting in COSO ERM?

A

sharing info from int/ext sources throughout the org. systems are used to process, capture and report business risk, culture and performance

117
Q

what are the components of risk culture?

A

risk appetite/ tolerance
resp and accountability for IT risk mgmt
awareness and comm
risk culture

118
Q

what does risk governance do?

A

provides policies, controls and op guidelines that enable IT leaders to manage risk and weigh bus value

119
Q

types of risk?

A

capacity (amount able to take)
universe (all possible risks)
tolerance (capacity minus appetite)
appetite (willing to take)

120
Q

what is the risk profile?

A

something that will outline the number/type of risks and the effects thereof. allows the org to anticipate additional costs and disruptions to ops.

121
Q

controls for info security / trust services framework?

A
  • sys reliability
  • confidentiality
  • privacy
  • processing integrity
  • availability
  • security
122
Q

security in trust services framework?

A

access to system and data is controlled and restricted to legit users

123
Q

confidentiality in trust services framework?

A

implies a relationship between two or more persons in which the info com betw them is kept in confidence. sensitive org data is protected

124
Q

privacy in trust services framework?

A

privacy of data/info is necessity to preserve and protect personal info from the org from being accessed by a third party

125
Q

processing integrity in trust services framework?

A

data are processed accurately, completely, timely and with proper auth

126
Q

security life cycle?

A

1) assess threats, select risk response
2) develop and comm policy
3) acquire and implement systems
4) monitor performance
repeat
risks can change and threats can inc so policy may need to be revisited

127
Q

defense in depth security approach?

A

multiple layers of control (prevent and detect) to avoid a single point of failure?

128
Q

security is effective if?

A

P > D + C
(time it takes hacker to break through Prev ctrls)
(time it takes to Detect)
(time it takes to respond to the attack and Correct)

129
Q

steps used by criminals to attack IS?

A
  • reconnaissance
  • attempting social engineering (spear fishing)
  • scan and map target
  • research
  • execute attack
  • cover tracks (back doors)
130
Q

what is confidentiality?

A

implies a relationship between persons in which the info comm betw them is to be kept in confidence
(org intellectual property, plans, secrets)

131
Q

what is data/info privacy?

A

the necessity to protect any personal info collected by an org from being accessed by a third party
(personal info of employees, vendors, cust)

132
Q

how to protect the priv/conf of sensitive info?

A
  • identify/classify the info to protect (location, access)
  • encrypt the info by protecting it in transit/storage (only accessed by auth people)
  • add access controls
  • training users of the info
133
Q

what is data masking?

A

concealing/encrypting selected info (such as when third parties access reports but aren’t authorized to see certain info)

134
Q

what is data exfiltration?

A

when malware carries out an unauth transfer from a computer (data theft)

135
Q

what are the gen accepted privacy principles?

A

(sets out how users may collect, store, use and disclose personal info)

  • mgmt (policies with assigned with resp)
  • notice (tell people about policies)
  • choice and consent (opt-in/out)
  • collection (only needed info)
  • quality
  • use and retention (for bus purposes)
  • disclosure to third parties
  • access (cust should be able to access/review data)
  • security (protect from loss, unauth access)
  • monitoring and enforcement (compliance)
136
Q

what influences encryption strength?

A
  • key length
  • algorithm
  • mgmt policy
137
Q

what is an encryption key?

A

a random string of bits created explicitly for scrambling and unscrambling data. reverses encryption process to make info readable.

138
Q

what is cipher text?

A

encrypted text

139
Q

what happens in pub/priv encryption?

A

multiple people access the public key (encodes messages)

one or a few people access the private key which decodes messages

140
Q

what creates a hash?

A

a hashing algorithm

141
Q

what is cryptography?

A

the science of de/coding messages to keep them secure

142
Q

what is a hash?

A

a number generated from a string of text, in a way that a similar hash with the same value cannot be produced. fixed length.

143
Q

what are hashes used for?

A

used to validate content integrity, by detecting mods, and changes to a hash output. reflects every bit in a doc.

144
Q

what does encryption do?

A

encodes data for the primary purpose of maintaining data conf and security

145
Q

hashing vs encryption diff

A

encryption is two way function that incl encryption and decryption (reversible). hashing is a one way function that changes plain text to a unique irreversible digest.

146
Q

hashing vs encryption sim

A
  • both ideal in handling data, messages, info

- both change data into a diff format

147
Q

what is a digest?

A

is a cryptographic hash

148
Q

how is a hash encrypted

A

with the private key of the person who created it

149
Q

encryption/decryption for a message?

A

sender encrypts using receiver’s public key, receiver decrypts using their private key

150
Q

encryption/decryption for a digital signature?

A

created by encrypting the hash using sender’s private key. it is decrypted with the sender’s public key

151
Q

what is key escrow?

A

a data security measure in which a cryptographic key is entrusted to a third party

152
Q

what is a cryptographic key used for?

A

encrypts and decrypts data

153
Q

symmetric system vs asymmetric

A

same key encrypts and decrypts
vs
encrypt with public key, decrypt with private

154
Q

if symmetric system key is stolen?

A

the attacker can access any info encrypted with

155
Q

if asymmetric system key is stolen?

A

public key is widely distributed. private key stored securely. if private key is compromised, the attacker can decrypt all info sent to you that was encrypted with your public key, but can also impersonate you with you private key (create dig signatures)

156
Q

what is a digital signature?

A

a way to ensure that an electronic doc is authentic (not modified, who created it). relies on encryption.

157
Q

what is authentication?

A

verifying that info is coming from a trusted source

158
Q

creating a digital signature?

A
  • the document creator creates a hash (algorithm) of the og document
  • they use their private key to encrypt the hash, which becomes a legally-binding DS
159
Q

what is non-repudiation?

A

the assurance that someone cannot deny the validity of something. provides proof of date origin and integrity. digital signatures (combined w other stuff) can offer this.

160
Q

what can digital signatures assure?

A

that someone cannot enter into a digital transaction and deny that they have done so and refuse to fulfil their side of the contract

161
Q

if hashes are identical?

A

docs are identical

162
Q

if something can be decrypted with someone’s public key?

A

it must have been enc with their private key

163
Q

symmetric encryption?

A
  • one key to dec and enc
  • both parties need to know the key and need to securely comm it. cannot be shared w multiple parties. they each get their own key (same one) from the org
  • encrypting large amts of info
164
Q

adv and disadv of symmetric enc?

A
  • speed
  • requires sep key for everyone who wishes to comm
  • must find a secure way to share keys
165
Q

risks of both asymm and symm enc?

A

protecting shared key from loss / theft

166
Q

adv of asym enc?

A
  • everyone can use ur public key to comm w u

- no need to store keys for each party

167
Q

disadv of asym enc?

A
  • slow

- requires PKI to validate ownership of public keys

168
Q

primary use of asym enc?

A
  • creating digital signatures

- secure exchanges of sym keys via email

169
Q

what is a PKI?

A

(public key infrastructure)
a set of roles, policies, procedures needed to create, manage, distribute, store, revoke DS and manage public key encryption

170
Q

what does a VPN do?

A
  • extends a private network across a public network and allows users to send and receive data across public networks as if their devices were directly connected in a private network
  • securely transmits encrypted data between two individuals with the appropriate enc/dec keys
171
Q

what is a hash code/value?

A

a numeric value of fixed length that uniquely identifies data. represents large amounts of data. used as DS.