Lesson 8 Flashcards
Anti-Virus Software
Software that scans disk and programs for known viruses and and eliminates them.
Asymmetric Encryption
An encryption technique in which two keys (a private key and a public key) are used: one to encrypt and decrypt a message. Also know as public key cryptography.
Authentication
The process of identifying the identity of a user who logs on to a system, or the integrity of transmitted data.
Decryption
The process of converting encrypted data back to its original form.
Digital Certificate
A password-protected, encrypted data file containing message encryption, user identification and message text. Used to authentication a program or a sender’s public key, or to initiate SSL sessions, Must be signed by a certificate authority (CA) to be valid.
Digital Signature
An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time of the signature.
Encryption
A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.
Firewall
A security barrier that controls the flow of information between the Internet and a private network. It prevents outsiders from accessing an enterprise’s internal network, which accesses the Internet indirectly through a proxy server.
Hash
A number generated by an algorithm from a text string. Also, known as a message digest.
Hash Encryption
An encryption method in which hashes are used to verify the integrity of transmitted messages. Also known as one-way encryption.
Illicit server
An application that installs hidden services on systems. Illicit servers consist of “client” code and “server” code that enable the attacker to monitor and control the operation of the computer infected with the server code.
Internet Control Messaging Protocol
A subset of Internet Protocol that is most often used to determine whether a computer can communicate with the rest of the network.
Key
A variable value, such as a numeric code,that uses an algorithm to encrypt and decrypt data. Some applications encrypt and decrypt with the same key, whereas other applications use a pair of keys.
Malware
Abbreviation for malicious software. It is software designed to harm computer systems.
Non-Repudiation
The security principle of providing proof that a transaction occurred between identified parties. Repudiation occurs when one party in a transaction denies that the transaction took place.