Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

13 12.1 Match the terms with their definitions: 1. virtual private network (VPN) 2. data loss prevention (DLP) 3. digital signature 4. digital certificate 5.

13 12.1 Match the terms with their definitions: 1. virtual private network (VPN) 2. data loss prevention (DLP) 3. digital signature 4. digital certificate 5. data masking 6. symmetric encryption 7. blockchain 8. plaintext 9. hashing 10. ciphertext 11. information rights management (IRM) 12. certificate authority 13. nonrepudiation 14. digital watermark 15.asymmetric encryption 16. key escrow 17.nonce a. Random number used to validate a new block in a blockchain b. A hash encrypted with the creator's private key c. Company that issues pairs of public and private keys and verifies the identity of the owner of those keys d. Secret mark used to identify proprietary information e. Encrypted tunnel used to transmit information securely across the Internet f. Replacing real data with fake data g. Unauthorized use of facts about another person to commit fraud or other crimes h. Distributed ledger of hashed documents i. Process of turning ciphertext into plaintext j. Document or file that can be read by anyone who accesses it k. Used to store an entity's public key, often found on websites 1. Procedure to filter outgoing traffic to prevent confidential information from leaving m. Process that transforms a document or file into a fixed-length string of data n. Document or file that must be decrypted to be read o. Copy of an encryption key stored securely to enable decryption if the original encryption key becomes unavailable p. Encryption process that uses a pair of matched keys, one public and the other private; either key can encrypt something, but only the other key in that pair can decrypt q. Encryption process that uses the same key to both encrypt and decrypt r. Inability to unilaterally deny having created a document or file or having agreed to perform a transaction s. Software that limits what actions (read, copy, print, etc.) can be performed by users granted access to a file or document

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Selected Material From Managerial Accounting

Authors: Hilton

2nd Edition

0072383348, 978-0072383348

More Books

Students also viewed these Accounting questions

Question

LO1 Understand risk management and identify its components.

Answered: 1 week ago