Encryption - A process of encoding messages to keep them secret, so only "authorized" parties can read it., Decryption - Taking a secret message and reproducing the original plain text., Symmetric Key Encryption - Involves one key for both encryption and decryption., Asymmetric (Public Key) Encryption - Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message., Cipher - Generic term for a technique (or algorithm) that performs encryption, Caesar's Cipher - Cipher with alphabetic shift, Random Substitution Cipher - Cipher that replaces one letter with another, Keylogging - Use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information, Malware - Software intended to damage a computing system or to take partial control over its operation, Rogue Access Point - A wireless access point that gives unauthorized access to secure networks.wireless access point that gives unauthorized access to secure networks., Phishing - Technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails., PII: Personally Identifiable Information - Information about an individual that identifies, links, relates, or describes them., Multifactor Authentication - Method of computer access in which a user has to successfully provide evidence in at least two methods,

Ranking

Estilo visual

Opções

Alterar modelo

Restaurar arquivo salvo automaticamente: ?