click below
click below
Normal Size Small Size show me how
CIW
LESSON 8
Question | Answer |
---|---|
What are some Cookie types? | persistent session first-party third-party |
The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data | Authentication |
No user name or password are required, and authentication is handled transparently by the browser and server | Anonymous logon |
A user name and password are required, and that information is sent as plain text | Basic authentication |
Symmetric (private-key) encryption | The same key is used to encrypt and decrypt messages |
Two keys are used to encrypt and decrypt messages: a public key and a private key | Asymmetric (public-key) |
Uses hashes to verify the integrity of transmitted messages | Hash (one-way) encryption |
You must have the proper digital certificate to gain access | Digital certificates |
Used to log on to private and public networks, including the Internet | User names and passwords |
Electronic signatures that verify the identity of the message sender | Digital signatures |
Digital signatures prove that a transaction or transmission took place; neither the sender nor the receiver can later deny the action | Non-repudiation |
The process of converting data into an unreadable form of text | Encryption |
The process of converting the encrypted data back to its original form | Decryption |
A mathematical algorithm | Key |
A protocol for secure exchanges | Secure Sockets Layer (SSL) |
Damages computers and networks, often alters files to damage or destroy data | Virus |
Resides in active memory and replicates itself until an entire disk is full | Worm |
Installs hidden services on systems | Illicit server |
Allows remote access to a computer by an attacker | Client code |
Infects destination computer and enables the attacker to control it | Server code |
A collection of hardware, software and corporate policies that prevents unauthorized access to or from private networks | Firewall |