ACC 3202 Chapter Notes - Chapter 4: Uninterruptible Power Supply, Systems Development Life Cycle, Business Continuity Planning

76 views3 pages
14 Mar 2017
Department
Course
Professor

Document Summary

Not restricted to only particular account application. Examine/ alert user to an invalid entry. Ensure person accessing it systems is valid and authorized. Firewall: hardware or software combination designed to block unauthorized access. Encryption: converting data into secret codes refereed to as cipher text. Symmetric encryption: uses single key to encrypt decode. Public key encryption: uses both a public key and a private key. Wired equivalency privacy: wep employees 64-, 128-, 256-, bit encryption methods. Wireless protected access improved encryption user authentication. Service set identifier (ssid) password passed between sending and receiving nodes of a wireless network. Virtual private network: utilizes tunnels, authentical, and encryption within internet network to isole internet communications. Secure sockets layer: communication protocol built into web server & browser software that encrypts data transferred on that website. Virus: self replication piece of program undertaken to insert viruses or worms into a system.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents