Midterm Lesson 2 Flashcards
It is a process of identifying an individual and ensuring that the individual is the same who he/she claims to be.
It is a process of identifying an individual and ensuring that the individual is the same who he/she claims to be.
A typical method for authentication over internet is via _______ and ________.
username; password
It is a password which can be used one time only and is sent to the user as an SMS or an email at the mobile number/email address that they have specified during the registration process.
One Time Password (OTP)
It is known as two-factor authentication method and requires two type of evidence to authentication an individual to provide an extra layer of security for authentication. Some other popular techniques for two-way authentication are: biometric data, physical token, etc. which are used in conjunction with username and password.
One Time Password (OTP)
It is a technique to convert the data in unreadable form before transmitting it over the internet. Only the person who have the access to the key and convert it in the readable form and read it.
Encryption
To avoid the transfer of key a method called ________, also known as public key encryption, is used.
asymmetric key encryption
It is a technique for validation of data. Validation is a process of certifying the content of a document.
Digital Signatures
The __________ is created by encrypting the data with the private key of the sender.
digital signature
A special program called an _______ is used which is designed to protect the system against virus. It not only prevents the malicious code to enter the system but also detects and destroys the malicious code that is already installed into the system.
anti-virus
It is a hardware/software which acts as a shield between an organization’s network and the internet and protects it from the threats like virus, malware, hackers, etc. It can be used to limit the persons who can have access to your network and send information to you.
Firewall
There are two type of traffic in an organization: ________ traffic and _____ traffic.
inbound traffic and outbound traffic.
Example of this are routers through which the network is connected to the network outside the organization i.e. Internet.
hardware firewalls
These firewalls are installed and installed on the server and client machines and it acts as a gateway to the organizations‟ network.
Software Firewalls
All the outbound traffic is routed through proxies for monitoring and controlling the packet that are routed out of the organization.
Proxy
Based on the rules defined in the policies each packet is filtered by their type, port information, and source & destination information.
Packet Filtering