Java Games: Flashcards, matching, concentration, and word search.

Internet Security(IBF)

Correctly match each term with the correct description.

AB
EncryptionReduces the risk of information theft by scrambling information sent via the internet.
KeyA variable value, such as a numeric code, that uses an algorithm to encrypt and decrypt data.
Symmetric (Private Key ) EncryptionAn encryption method in which the same key is used to encrypt and decrypt a message.
Asymmetric (Public Key) EncryptionAn encryption method in which 2 keys are used to encrypt and decrypt a message.
Hash One Way EncryptionAn encryption method in which hashes are used to verify the integrity of transmitted messages.
HashA number generated by an algorithm from a string of text.
AuthenticationThe process of verifying the identity of a user who logs on to a computer system, or verifying the integrity of transmitted data.
Digitall CertificateA password protected, encrypted data file that verifies the identity of a sender of a message.
Digital Signaturean electronic stamp that identifies a message's source and its contents.
Non RepudiationAbility to prove that a transaction occurred.
FirewallA security barrier that prevents unauthorized access to or from private networks.
Desktop FirewallsOften refferred to as personal firewalls and offer protection for individual systems instead of entire networks.
Internet Control Messaging ProtocolA subset of Internet Protocol that is most often used to determine whether a computer can communicate with the rest of the network.



This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities