CGS 3300 Chapter Notes - Chapter 5: Cryptographic Protocol, The Sender, Logic Bomb

73 views4 pages

Document Summary

Access controls designed to protect systems from unauthorized access in order to preserve data integrity. Adware a form of spyware that collects information about the user (without the user"s consent) to determine which advertisements to display in the user"s web browser. Asymmetric encryption uses two keys: a public key known to everyone and a private or secret key known only to the recipient. A message encrypted with a public key can be decrypted only with the same algorithm used by the public key and requires the recipient"s private key, too. Anyone intercepting the message cannot decrypt it because he or she does not have the private key. Availability computers and networks are operating, and authorized users can access the information they need. It also means a quick recovery in the event of a system failure or disaster. backdoor a programming routine built into a system by its designer or programmer.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents