ACC 220 Lecture Notes - Lecture 39: Public-Key Cryptography, Plaintext, Digital Signature

16 views2 pages

Document Summary

Ip spoofing gaining unauthorized access to a web server and/or perpetrating an unlawful act without revealing one"s identity. Perpetrator modifies ip address to disguise identity. Can be used to commit fraud, conduct acts of espionage, or destroy data. Denial of service attack (dos) assault on a web server to prevent it from servicing its legitimate users. Worm malicious software program whose primary function is to infect other computers while remaining active on infected systems. Logic bomb code inserted into a software system that will set off malicious function when specified conditions are met. Trojan horse - malware disguised as legitimate software. Encryption conversion of data into a secret code for storage in databases and transmission over networks. Sender uses encryption algorithm to convert original message (called cleartext) into coded equivalent (called ciphertext) Earliest encryption method, like modern-day encryption, used a key and an algorithm. Key mathematical value that the sender selects.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents