Lesson 1 Flashcards

1
Q

Ensures that information is only accessible to those authorized to view it.

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

is the science and art of securing information by transforming it into an unreadable format. This transformation is done using algorithms and keys, making the information inaccessible to unauthorized users.

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ensures that information has not been altered in transit.

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Verifies the identity of the parties involved in communication.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ensures that a sender cannot deny sending a message.

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

is the process of converting plain text (readable data) into ciphertext (an unreadable format) using a cryptographic algorithm and an encryption key. The purpose of encryption is to protect the confidentiality of the data, ensuring that only authorized parties can read it.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The original, readable data. Encryption Algorithm: The mathematical procedure used to transform the plaintext.

A

Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A piece of information that determines the output of the encryption algorithm.

A

Encryption Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The resulting, unreadable data after encryption

A

Ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

is the reverse process of encryption. It involves converting the ciphertext back into its original plaintext form using a decryption algorithm and a decryption key. Decryption ensures that the data can be read and understood by the intended recipient.

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Protects personal, financial, and proprietary information from unauthorized access

A

Data Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ensures that messages and data transmitted over networks remain confidential and secure Compliance: Helps organizations comply with data protection regulations and standards (e.g., GDPR HIPAA).

A

Secure Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Helps organizations comply with data protection regulations and standards (e.g., GDPR, HIPAA).

A

Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Prevents data tampering and ensures that the information remains unaltered during transmission

A

Data Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Verifies the identity of users and systems, preventing impersonation and fraud.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The same key is used for both encryption and decryption Examples: AES (Advanced Encryption Standard), DES (Data Encryption Standard)

A

Symmetric Keys

16
Q

Uses a pair of keys-a public key for encryption and a private key for decryption

A

Asymmetric Keys

17
Q

Used in hashing algorithms to produce a fixed-size hash value from data, ensuring data integrity.

A

Hash Keys