| A | B |
| Encryption | Reduces the risk of information theft by scrambling information sent via the internet. |
| Key | A variable value, such as a numeric code, that uses an algorithm to encrypt and decrypt data. |
| Symmetric (Private Key ) Encryption | An encryption method in which the same key is used to encrypt and decrypt a message. |
| Asymmetric (Public Key) Encryption | An encryption method in which 2 keys are used to encrypt and decrypt a message. |
| Hash One Way Encryption | An encryption method in which hashes are used to verify the integrity of transmitted messages. |
| Hash | A number generated by an algorithm from a string of text. |
| Authentication | The process of verifying the identity of a user who logs on to a computer system, or verifying the integrity of transmitted data. |
| Digitall Certificate | A password protected, encrypted data file that verifies the identity of a sender of a message. |
| Digital Signature | an electronic stamp that identifies a message's source and its contents. |
| Non Repudiation | Ability to prove that a transaction occurred. |
| Firewall | A security barrier that prevents unauthorized access to or from private networks. |
| Desktop Firewalls | Often refferred to as personal firewalls and offer protection for individual systems instead of entire networks. |
| Internet Control Messaging Protocol | A subset of Internet Protocol that is most often used to determine whether a computer can communicate with the rest of the network. |