10) Security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/28

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 4:08 PM on 5/1/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

29 Terms

1
New cards

What is network security?

Protecting data and services from attacks

2
New cards

What is confidentiality?

Only sender and receiver understand message

3
New cards

What is authentication?

Verifying identity of sender or receiver

4
New cards

What is message integrity?

Ensuring message is not altered

5
New cards

What is availability?

Services remain accessible

6
New cards

What can attackers do?

Eavesdrop insert spoof hijack DoS

7
New cards

What is eavesdropping?

Intercepting messages

8
New cards

What is spoofing?

Faking identity

9
New cards

What is hijacking?

Taking over connection

10
New cards

What is DoS?

Overloading system to block access

11
New cards

What is plaintext?

Original message

12
New cards

What is ciphertext?

Encrypted message

13
New cards

What is encryption?

Converting plaintext to ciphertext

14
New cards

What is decryption?

Converting ciphertext to plaintext

15
New cards

What is symmetric key crypto?

Same key used for encryption and decryption

16
New cards

What is AES?

Modern symmetric encryption standard

17
New cards

What is public key crypto?

Uses public and private key pair

18
New cards

What is public key?

Known to everyone

19
New cards

What is private key?

Known only to owner

20
New cards

What is RSA?

Public key encryption algorithm

21
New cards

What makes RSA secure?

Hard to factor large numbers

22
New cards

What is session key?

Temporary symmetric key

23
New cards

What is digital signature?

Encrypt hash with private key

24
New cards

What does digital signature provide?

Authentication integrity non-repudiation

25
New cards

What is hash function?

Creates fixed-size message digest

26
New cards

What is message digest?

Fingerprint of message

27
New cards

What is CA?

Certifies public keys

28
New cards

What is certificate?

Binds identity to public key

29
New cards

What problem do CAs solve?

Prevent fake public keys