Answered step by step
Verified Expert Solution
Question
1 Approved Answer
13 12.1 Match the terms with their definitions: 1. virtual private network (VPN) 2. data loss prevention (DLP) 3. digital signature 4. digital certificate 5.
13 12.1 Match the terms with their definitions: 1. virtual private network (VPN) 2. data loss prevention (DLP) 3. digital signature 4. digital certificate 5. data masking 6. symmetric encryption 7. blockchain 8. plaintext 9. hashing 10. ciphertext 11. information rights management (IRM) 12. certificate authority 13. nonrepudiation 14. digital watermark 15.asymmetric encryption 16. key escrow 17.nonce a. Random number used to validate a new block in a blockchain b. A hash encrypted with the creator's private key c. Company that issues pairs of public and private keys and verifies the identity of the owner of those keys d. Secret mark used to identify proprietary information e. Encrypted tunnel used to transmit information securely across the Internet f. Replacing real data with fake data g. Unauthorized use of facts about another person to commit fraud or other crimes h. Distributed ledger of hashed documents i. Process of turning ciphertext into plaintext j. Document or file that can be read by anyone who accesses it k. Used to store an entity's public key, often found on websites 1. Procedure to filter outgoing traffic to prevent confidential information from leaving m. Process that transforms a document or file into a fixed-length string of data n. Document or file that must be decrypted to be read o. Copy of an encryption key stored securely to enable decryption if the original encryption key becomes unavailable p. Encryption process that uses a pair of matched keys, one public and the other private; either key can encrypt something, but only the other key in that pair can decrypt q. Encryption process that uses the same key to both encrypt and decrypt r. Inability to unilaterally deny having created a document or file or having agreed to perform a transaction s. Software that limits what actions (read, copy, print, etc.) can be performed by users granted access to a file or document
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started