1/10
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Hackers
People who access a computer or network illegally are called ____________.
Encryption
A security strategy that codes data into an unrecognizable format that no one can understand is called _____________.
Phishing
__________ is when a hacker tries to make an email or website look legitimate in order to trick the user into downloading malware or providing confidential information.
Encrypt
Converting readable data into a coded format to prevent unauthorized access.
Decrypt
Reversing the encryption process to restore the data to its original form.
Plaintext
The original, readable data before encryption.
Ciphertext
The encrypted version of the plaintext that appears as scrambled text.
Cipher
The mathematical algorithm used to perform encryption and decryption
Encryption Key .
A secret value used by a cipher to encode or decode data.
Private Key Encryption
Also known as symmetric encryption, where the same key is used for both encryption and decryption.
Public Key Encryption
Also known as asymmetric encryption, where a public key encrypts the data, and a private key decrypts it.