Lesson 22: Protecting Data Moving through the Internet Flashcards
(41 cards)
Glossary: 3DES
A block cipher encryption algorithm that employs symmetric keys. It applies the DES algorithm three times to each block.
Glossary: AAA Protocol
A protocol for authentication, authorization, and accounting that uses different link layer protocols such as PPP and authenticates using PAP or CHAP.
Glossary: Algorithm
a code used to alter a message so that unauthorized people cannot read it
Glossary: Assymetric Key
A key that used the encryption algorithm. It is defined by two keys: One used for encryption and one for decryption
Glossary: Asymmetrical (out-of-band) virtualization
A type of virtualization where the virtualization device is installed outside the actual data path between the network and the storage system.
Glossary: Authentication Server (AS)
A server whose function is to provide network users with authentication
Glossary: block cipher
a cipher that applies an algorithm to a block of data, rather than a single bit at a time
Glossary: blowfish
A block-level encryption algorithm that uses symmetric-key encryption
Glossary: brute-force attack
An attack where the attacker systematically guesses the key based on a known list or a predictive mathematical scheme. Can involve 100s-1000s of attempts.
Glossary: caching web proxy
a local server that cacher (store) web resources for quicker access.
Glossary: Certificate Chain
the list of certificates starting with the root certificate, followed bu each subsequent certificate, where the issuer or signer of one certificate is the subject of the next
Glossary: Cipher
An algorithm used to encrypt data
Glossary: Cipher Lock
A lock that operates by unlocking magnetic door locks when the correct programmed code is entered by the user on the cipher lock keypad
Glossary: Ciphertext
the text of any data after it has been encoded by a cryptographic key
Glossary: Cleartext
the stored or transmitted data, which has not been encrypted
Glossary: Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA)
A form of input request for a word, phrase, random characters and numbers, or a simple request to perform a simple test that cannot easily be automated.
Glossary: CRAM-MD5
An email authentication system that transfers passwords in a hased form
Glossary: cryptography
the procedures, processes, and techniques used to convert data into secret code
Glossary: cryptology
the study of cryptography
Glossary: data in motion
the process, in which data is being transmitted through a wired or wireless network
Glossary: decrypt
an act of using the relevant key to unlock the scrambled ciphertext into plaintext so that it might be understood
Glossary: decryption
the process of converting previously encrypted data back to its original form
Glossary: decryption key
the key used to decrypt a secret code
Glossary: digital certificate
a certificate that digitally verifies that the sender of an encrypted message is who they claim to be