CGS 3300 Chapter Notes - Chapter 5: Cryptographic Protocol, The Sender, Logic Bomb

74 views4 pages

Document Summary

Access controls designed to protect systems from unauthorized access in order to preserve data integrity. Adware a form of spyware that collects information about the user (without the user"s consent) to determine which advertisements to display in the user"s web browser. Asymmetric encryption uses two keys: a public key known to everyone and a private or secret key known only to the recipient. A message encrypted with a public key can be decrypted only with the same algorithm used by the public key and requires the recipient"s private key, too. Anyone intercepting the message cannot decrypt it because he or she does not have the private key. Availability computers and networks are operating, and authorized users can access the information they need. It also means a quick recovery in the event of a system failure or disaster. backdoor a programming routine built into a system by its designer or programmer.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents