IS3230 CHAPTER 13 Flashcards
The process of confirming the identity of a user is called ___.
AUTHENTICATION
An entity, usually a trusted third party, that issues digital certificates is called ___.
CERTIFICATE AUTHORITY (CA)
The certificate authorities list of invalid certificates is called ___.
CERTIFICATE REVOCATION LIST (CRL)
Applications or IT services delivered over the Internet rather than in a typical client/server model on a local area network is called ___.
CLOUD SERVICES
Ensuring that only the intended recipient can read the data is called ___.
CONFIDENTIALITY
The hardware or software system that transforms the clear text into cipher text is called ___.
CRYPTOSYSTEM
A protocol or an algorithm allowing two users to exchange a secret key over insecure communications is called ___.
DIFFIE-HELLMAN KEY EXCHANGE
This provides a stronger cryptographic result with a shorter key is called ___.
ELLIPTIC CURVE CRYPTOSYSTEM (ECC)
The process of applying an algorithm to clear-text (or plain-text) data, resulting in a cipher text is called ___.
ENCRYPTION
Ensuring the data has not been altered is called ___.
INTEGRITY
The range of values that construct a crypto system key is called ___.
KEYSPACE
The concept of ensuring an originator cannot refute the validity of a statement or document is called ___.
NON-REPUDIATION
A framework that consists of programs, procedures, and security policies that employs public key cryptography and the X.509 standard (digital certificates) is called ___.
PUBLIC KEY INFRASTRUCTURE (PKI)
An entity that is responsible for the registration and initial authentication of certificate subscribers is called ___.
REGISTRATION AUTHORITY (RA)
A public key crypto system based on factoring large numbers that are a product of two prime numbers is called ___.
RSA ASYMMETRIC ENCRYPTION ALGORITHM