Digital Solutions External Exam

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/41

flashcard set

Earn XP

Description and Tags

Unit 3 and 4 Revision

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

42 Terms

1
New cards
Extensible Markup Language; XML
Hierarchical method for text data storage, that constructs like a tree and utilises name value pairs.
2
New cards
Availability
The possibility that someone may interfere with the transmission to prevent the data packets from reaching the intended destination.
3
New cards
Confidentiality
The possibility that an unauthorised person will see the data in transit.
4
New cards
Integrity
The possibility that someone may intercept the data message and will maliciously modify or replace it.
5
New cards
Symmetric Encryption
Encryption algorithms that use a single key to encrypt and decrypt a message.
6
New cards
Triple Data Encryption Standard; TripleDES
Symmetric encryption algorithm that encrypts data three times using a different key for each iteration. It is used in ATMs to encrypt PINs.
7
New cards
Blowfish and Twofish
Open source symmetric encryption algorithms that split messages into blocks of 64 or 128 bits, encrypting each block individually. It is used for application level encryption.
8
New cards
Advanced Encryption Standard; AES
Symmetric block cipher.
9
New cards
Asymmetric Encryption
Encryption algorithms that use separate keys to encrypt and decrypt a message.
10
New cards
Rivest-Shamir-Adleman; RSA
Asymmetrical mathematical algorithm involving prime numbers and the Euclidian algorithm. Used by most URLs beginning with "https://" to encrypt the transmissions between devices and the web server.
11
New cards
Pretty Good Privacy; PGP
Algorithm that uses a symmetric key to encrypt data which is protected by an asymmetric key.
12
New cards
Digital signature
Mathematical scheme for verifying the authenticity of a digital message or document.
13
New cards
OAuth2
An application token that acts as a digital keys, used to access protected data.
14
New cards
Checksum
Verify if data has not being modified during transmission or storage. They are used to validate integrity (not authenticity).
15
New cards
Message Authentication Code; MAC
Symmetric key cryptographic technique that checks to see whether a message has been modified.
16
New cards
Hashing
Cryptographic techniques that takes a plaintext password and creates a random, fixed length string of characters.
17
New cards
Salt
A randomly generated additional string of characters that is added to each user's individual password before hashing and storing it.
18
New cards
Pepper
A secret randomly generated additional string of characters that is often stored separately from the hashed password.
19
New cards
Message Digest 5; MD5
One-way hash function used to create digital signatures, encrypt passwords and verify data integrity.
20
New cards
Latency
The delay between when an application requests data and until the data is received.
21
New cards
Serialisation
When the size of the packet and the speed of the network interface causes delay, resulting in latency.
22
New cards
Propagation
When the distance between the device and the server causes delay, resulting in latency.
23
New cards
Switching
When routers redirect or change flow or network traffic, resulting in latency or jitter.
24
New cards
Queuing
When the network is congested, resulting in latency or jitter.
25
New cards
Jitter
The irregular latency in data exchanges, resulting in applications not running smoothly.
26
New cards
Load balancing
When there are two or more paths to a destination with equal cost metrics and packets arrive out of order, resulting in jitter.
27
New cards
Quality of Service; QoS
Networking standards that prioritise some packets over others to reduce latency and/or jitter.
28
New cards
Timeliness of Delivery
Currency of a data packet at the time it is received, measured by comparing the timestamp of the packet to its delivery deadline and counting the number of packets that arrive after the deadline.
29
New cards
Australian Privacy Principles (2014); APP
Applicable sets standards, right and obligations, that consists of: the collection use and disclosure of personal information; a organisation or agency's governance and accountability; integrity and correction of personal information; the rights of individuals to access their personal information.
30
New cards
Internet Protocol; IP
Set of rule for routing and addressing packets of data so that they can travel across networks and arrive at the correct destination.
31
New cards
Hypertext Transfer Protocol; HTTP
Application transfer protocol for distributed, collaborative, hypermedia information systems that allows users to communicate data on the World Wide Web.
32
New cards
Hypertext Transfer Protocol Secure; HTTPS
A secure version of HTTP that uses Transport Layer Security (TLS) or Secure Socket Layer (SSL) protocols to encrypt the transmission using public key encryption methods.
33
New cards
File Transfer Protocol; FTP
Is an application layer protocol used to exchange files over the Internet. It is used by web developers to upload files to a web server.
34
New cards
Virtual Private Network; VPN
Encrypted connections between two network devices.
35
New cards
Representational State Transfer; REST
Client-server architecture for manipulating an internet resource at a specific URL.
36
New cards
JavaScript Object Notation; JSON
Data exchange protocol based on JavaScript and is the standard for exchanging key-value data pairs.
37
New cards
Vigenere Cipher
Encryption algorithm that uses simple polyalphabetic code; made up of 26 distinct cipher alphabets.
38
New cards
Caesar Cipher
Encryption algorithm that shifts the alphabet by some number of characters.
39
New cards
One-time pad
An encryption algorithm that uses of a one-time pre-shared key the same size as, or longer than, the message being sent.
40
New cards
Gronsfeld Cipher
A variation of the Vigenere cipher in which a key number is used instead of a keyword.
41
New cards
User Datagram Protocol; UDP
A transport layer protocol that has minimal protocol mechanisms. There are no handshaking dialogues and hence is unreliable and does not guarantee delivery.
42
New cards
Transmission Control Protocol; TCP
A transport layer protocol that provides reliable data streaming with error correction and handshake dialogues.

Explore top flashcards