A | B |
Encryption | Reduces the risk of information theft by scrambling information sent via the internet. |
Key | A variable value, such as a numeric code, that uses an algorithm to encrypt and decrypt data. |
Symmetric (Private Key ) Encryption | An encryption method in which the same key is used to encrypt and decrypt a message. |
Asymmetric (Public Key) Encryption | An encryption method in which 2 keys are used to encrypt and decrypt a message. |
Hash One Way Encryption | An encryption method in which hashes are used to verify the integrity of transmitted messages. |
Hash | A number generated by an algorithm from a string of text. |
Authentication | The process of verifying the identity of a user who logs on to a computer system, or verifying the integrity of transmitted data. |
Digitall Certificate | A password protected, encrypted data file that verifies the identity of a sender of a message. |
Digital Signature | an electronic stamp that identifies a message's source and its contents. |
Non Repudiation | Ability to prove that a transaction occurred. |
Firewall | A security barrier that prevents unauthorized access to or from private networks. |
Desktop Firewalls | Often refferred to as personal firewalls and offer protection for individual systems instead of entire networks. |
Internet Control Messaging Protocol | A subset of Internet Protocol that is most often used to determine whether a computer can communicate with the rest of the network. |