Scheduled maintenance: Thursday, January 26 from 6PM to 7PM PST
hello quizlet
Home
Subjects
Expert solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Science
Computer Science
Computer Security and Reliability
APCS Principles Unit 4
Flashcards
Learn
Test
Match
Flashcards
Learn
Test
Match
Terms in this set (15)
T or F: Companies are required by law to give users the option to personalize what data they can collect about them
False
Caesar Cipher
Shifts every letter a fixed amount
Vigenere Cipher
-Shifts letters by applying a series of Caesar cipher
(Uses a key- ABC)
- The longer the key the harder it is to crack
-Cracked easily by frequency analysis
Public Key encryption
-Computationally hard to decipher
-Used on the web- Allows for secure messages to be sent between parties without having to agree on or share a secret key
-Uses an asymmetric encryption scheme- encryption key is made public but decryption key is kept private
How to solve MOD problems
how many times does the number after the mod go into the number before the MOD and the remainder is the answer
*If number after MOD is bigger than the number before mod then the answer is the number before the MOD
2 characteristics of an ideal encryption scheme
a Private key and computationally hard
Big Data
A broad term for data sets so large or complex that traditional data processing applications are inadequate
Moore's Law
A prediction made by Gordon Moore that computing power will double every 2 years
Cipher
a generic term for a technique that perfomrs an encryption
Cracking an encryption
when you attempt to decode a secret message without knowing all the specifics of the cipher. You are trying to crack the encryption
Decryption
A process that reverses encryption. Taking a secret message and reproducing the original plain text
Random Substitution cipher
an encryption technique that maps each letter of the alphbet to randomly chose other letters of the alphabet
Asymmetric encryption
Used in public key encryption
a scheme in which the key to encrypt data is different than the key to decrypt the data
Firewall
software that runs on servers that only allows traffic through according to some set of secruity rules
SSL/TLS
encryption layer of HTTP that uses public key cryptography to establish a secure connection
Other sets by this creator
IB Computer Science Exam: Flowcharts
4 terms
IB Computer Science - Command Terms
19 terms
Intro to Computer Science, Chapter 1-8 Multiple ch…
166 terms
Ap computer science principles exam 2 Mr. Richards…
53 terms
Verified questions
engineering
Taking u = f (x + αt) where f is any function, find the values of α that will ensure that u satisfies the wave equation $\frac{1}{c^{2}} \frac{\partial^{2} u}{\partial t^{2}}=\frac{\partial^{2} u}{\partial x^{2}}$
engineering
Calculate the speed $V$ at which the square-base block must be pushed down into the cylindrical tank so that the liquid in the tank rises with a velocity of $6 \mathrm{ft} / \mathrm{s}$.
physics
(a) Calculate the transmission probability of an alpha particle of energy E = 5.0 MeV through a Coulomb barrier of a heavy nucleus that is approximated by a square barrier with $V_{0}$= 15 MeV and barrier width $L=1.3 \times 10^{-14}$ m. Also, calculate the probability (b) by doubling the potential barrier height and (c) by using the original barrier height but doubling the barrier width. Compare all three probabilities.
engineering
The transistor has parameters $V_{T N}=0.4 \mathrm{~V}, k_n^{\prime}=120$ $\mu \mathrm{A} / \mathrm{V}^2$, and $W / L=80$. Design the circuit such that $I_Q=0.8 \mathrm{~mA}$ and $R_{\text {in }}=200 \mathrm{k} \Omega$
Recommended textbook solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th Edition
Jack T. Marchewka
346 solutions
Information Technology Project Management: Providing Measurable Organizational Value
5th Edition
Jack T. Marchewka
346 solutions
Service Management: Operations, Strategy, and Information Technology
7th Edition
James Fitzsimmons, Mona Fitzsimmons
103 solutions
Operating System Concepts
9th Edition
Abraham Silberschatz, Greg Gagne, Peter B. Galvin
489 solutions
Other Quizlet sets
MTA Sec Fund
115 terms
MTA 98-367 Security Fundamentals
199 terms
lecture 14 final
16 terms
Quiz 4
20 terms