Unit 4 - Module 9 Flashcards
(32 cards)
Caesar cipher
Earliest encryption method; Julius Caesar is said to have used it to send coded messages to his generals in the field.
key
Mathematical value that the sender selects for the purpose of encrypting or decoding data.
algorithm
Procedure of shifting each letter in the cleartext message by the number of positions that the key value indicates.
Advanced encryption standard (AES)
Also known as Rijndael, a private key (or symmetric key) encryption technique.
private key
Both the sender and the receiver use the same encryption key.
symmetric key
Single key used in an encryption algorithm to both code and decode a message.
public key encryption
Technique that uses two encryption keys: one for encoding the message, the other for decoding it.
Public Key Encryption
Rivest-Shamir-Adleman (RSA)
One of the most trusted public key encryption methods. This method, however, is computationally intensive and much slower than private key encryption.
digital envelope
.
digital signature
Electronic authentication technique that ensures the transmitted message originated with the authorized sender and that it was not tampered with after the signature was applied.
digital certificate
Sender’s public key that has been digitally signed by trusted third parties.
certification authorities (CAs)
A trusted third party that issues a digital certificate.
Public key infrastructure (PKI)
Constitutes the policies and procedures for administering this activity.
firewall
Software and hardware that provide a focal point for security by channeling all network connections through a control gateway.
network-level firewall
System that provides basic screening of low-security messages (e.g., e-mail) and routes them to their destinations based on the source and destination addresses attached.
application-level firewall
Provide high-level network security.
To qualify for the TRUSTe seal, an organization must:
- Agree to follow TRUSTe privacy policies and disclosure standards.
- Post a privacy statement on the website disclosing the type of information being collected, the purpose for collecting information, and with whom it is shared.
- Promptly respond to customer complaints.
- Agree to site compliance reviews by TRUSTe or an independent third party.
Verisign, Inc.
It provides assurance regarding the security of transmitted data. The organization does not verify security of stored data or address concerns related to business policies, business processes, or privacy.
International Computer Security Association
ICSA certification addresses data security and privacy concerns.
AICPA/CICA WebTrust
To display the AICPA/CICA WebTrust seal, the organization undergoes an examination according to the AICPA’s Standards for Attestation Engagements, No. 1, by a specially web-certified CPA or CA. The examination focuses on the areas of business practices (policies), transaction integrity (business process), and information protection (data security). The seal must be renewed every 90 days.
Safe Harbor Agreement
Two-way agreement between the United States and the European Union establishing standards for information transmittal.
intelligent control agents
Computer programs that embody auditor-defined heuristics that search electronic transactions for anomalies.
value-added network (VAN)
Hosted service offering that acts as an intermediary between business partners sharing standards-based or proprietary data via shared business processes.