IST 195 Lecture Notes - Lecture 7: Steganography, Multi-Factor Authentication, Data Theft

16 views1 pages

Document Summary

Only the sender and the receiver know the code to unlock the message. Messages can even be typed or hidden into images. A method of transforming information in order to hide its content. A key is used to decrypt information after it has been encrypted. Ciphertext is how a message appears when it is encrypted. Shift - move letters of the alphabet around. Words as keys - removing duplicate letters. Kryptos = statue in front of the cia headquarters that is heavily encrypted; this will be on the test. Multi-factor authentication = does not rely only on username and password. Passwords compromised all the time, so multi-factor greatly increases safety.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents