Module 13 Questions: CISB 11

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/10

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

11 Terms

1
New cards

Hackers

People who access a computer or network illegally are called ____________.

2
New cards

Encryption

A security strategy that codes data into an unrecognizable format that no one can understand is called _____________.

3
New cards

Phishing

__________ is when a hacker tries to make an email or website look legitimate in order to trick the user into downloading malware or providing confidential information.

4
New cards

Encrypt

Converting readable data into a coded format to prevent unauthorized access.

5
New cards

Decrypt

Reversing the encryption process to restore the data to its original form.

6
New cards

Plaintext

The original, readable data before encryption.

7
New cards

Ciphertext

The encrypted version of the plaintext that appears as scrambled text.

8
New cards

Cipher

The mathematical algorithm used to perform encryption and decryption

9
New cards

Encryption Key .

A secret value used by a cipher to encode or decode data.

10
New cards

Private Key Encryption

Also known as symmetric encryption, where the same key is used for both encryption and decryption.

11
New cards

Public Key Encryption

Also known as asymmetric encryption, where a public key encrypts the data, and a private key decrypts it.