Question: Match the terms with theirdefinitions: 1. Virtual private a. A hash encrypted with the creator's private key network (VPN) Data loss prevention 2. b. A

Match the terms with theirdefinitions:
Match the terms with their definitions:  .:.

1. Virtual private a. A hash encrypted with the creator's private key network (VPN) Data loss prevention 2. b. A company that issues pairs of public and private keys and verifies the identity of the owner of those keys c. A secret mark used to identify proprietary 3. Digital signature information 4. Digital certificate d. An encrypted tunnel used to transmit informa- Data masking 6. tion securely across the Internet e. Replacing real data with fake data f. Unauthorized use of facts about another person 5. Symmetric encryption to commit fraud or other crimes 7. Spam 8. Plaintext 9. Hashing g. The process of turning ciphertext into plaintext h. Unwanted e-mail i. A document or file that can be read by anyone who accesses it 10. Ciphertext j. Used to store an entity's public key, often found on websites 11. Information rights k. A procedure to filter outgoing traffic to prevent management (IRM) confidential information from leaving 12. Certificate authority A process that transforms a document or file into a fixed-length string of data 13. Nonrepudiation m. A document or file that must be decrypted to be read 14. Digital watermark . A copy of an encryption key stored securely to enable decryption if the original encryption key becomes unavailable 15. Asymmetric encryption o. An encryption process that uses a pair of matched keys, one public and the other private; either key can encrypt something, but only the other key in that pair can decrypt 16. Key escrow p. An encryption process that uses the same key to both encrypt and decrypt q. The inability to unilaterally deny having created a document or file or having agreed to perform a transaction . Software that limits what actions (read, copy. print, etc.) that users granted access to a file or document can perform

Step by Step Solution

3.44 Rating (163 Votes )

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

1 d Virtual Private Network VPN a A hash encrypted with the creators private key 2 k Data Loss Preve... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Document Format (1 attachment)

Word file Icon

373-B-A-I-S (4879).docx

120 KBs Word File

Students Have Also Explored These Related Accounting Questions!