Lesson 1 Flashcards
Ensures that information is only accessible to those authorized to view it.
Confidentiality
is the science and art of securing information by transforming it into an unreadable format. This transformation is done using algorithms and keys, making the information inaccessible to unauthorized users.
Cryptography
Ensures that information has not been altered in transit.
Integrity
Verifies the identity of the parties involved in communication.
Authentication
Ensures that a sender cannot deny sending a message.
Non-repudiation
is the process of converting plain text (readable data) into ciphertext (an unreadable format) using a cryptographic algorithm and an encryption key. The purpose of encryption is to protect the confidentiality of the data, ensuring that only authorized parties can read it.
Encryption
The original, readable data. Encryption Algorithm: The mathematical procedure used to transform the plaintext.
Plaintext
A piece of information that determines the output of the encryption algorithm.
Encryption Key
The resulting, unreadable data after encryption
Ciphertext
is the reverse process of encryption. It involves converting the ciphertext back into its original plaintext form using a decryption algorithm and a decryption key. Decryption ensures that the data can be read and understood by the intended recipient.
Decryption
Protects personal, financial, and proprietary information from unauthorized access
Data Privacy
Ensures that messages and data transmitted over networks remain confidential and secure Compliance: Helps organizations comply with data protection regulations and standards (e.g., GDPR HIPAA).
Secure Communication
Helps organizations comply with data protection regulations and standards (e.g., GDPR, HIPAA).
Compliance
Prevents data tampering and ensures that the information remains unaltered during transmission
Data Integrity
Verifies the identity of users and systems, preventing impersonation and fraud.
Authentication