Preview

Unit Btec Diploma It

Good Essays
Open Document
Open Document
950 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit Btec Diploma It
P3 describe how software and network security can keep systems and data secure

Public Key: a public key is a value provided by some designated authority as an encryption key that, combined with a private key derived from the public key, can be used to effectively encrypt messages and digital signatures

Private Key: Public-key cryptography refers to a cryptographic system requiring two separate keys, one to lock or encrypt the plaintext, and one to unlock or decrypt the cyphertext. Neither key will do both functions. One of these keys is published or public and the other is kept private.

Handshaking: The process by which two devices initiate communications. Handshaking begins when one device sends a message to another device indicating that it wants to establish a communications channel. The two devices then send several messages back and forth that enable them to agree on a communications protocol. Use of backups: In information technology, a backup or the process of backing up is making copies of data which may be used to restore the original after a data loss event.

Audit logs: Audit logs allow computer administrators to get a good idea of where visitors are coming from, how often they return, and how they navigate through a site

Firewall configuration: A firewall is simply a program or hardware device that filters the information coming through the Internet connection into your private network or computer system. If an incoming packet of information is flagged by the filters, it is not allowed through.
Virus checking software: Antivirus (or "anti-virus") software is a class of program that searches your hard drive and floppy disks for any known or potential viruses. The market for this kind of program has expanded because of Internet growth and the increasing use of the Internet by businesses concerned about protecting their computer assets.
VPN (virtual private network): A VPN is a private network that uses a public network

You May Also Find These Documents Helpful

  • Good Essays

    Entities can have one or more private-public key pairs and associated public key certificates. A certificate is a statement issued by a certification authority according to a policy that binds an entity 's public key to its name for a period of time. (You 'll learn more about policies later in the chapter.) Another entity that trusts this CA also trusts that the public key belongs to the named entity. When entity A is presented with a certificate by entity B, entity A can tell from the certificate name that the certificate belongs to a legitimate user of the system. Entity B proves he or she is the legitimate holder of the certificate by proving his or her knowledge of the associated private key. Entity A can optionally check the certificate 's current validity by looking it up on the CA 's CRL.…

    • 575 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Unit 7 P3 Research Paper

    • 1234 Words
    • 5 Pages

    There are two types of firewalls, hardware firewalls and software firewalls. Software firewalls provide another coating of security, software firewalls prohibit malware on your computer from being sent to others. Hardware firewalls treat any kind of traffic from travelling from a local network out to the internet as safe. An example of a threat entering your computer could be, you visit a website that contains a hidden malicious program that’s designed to secretly install itself on your machine and then send information out via the internet, this maybe to steal personal information, this is one method of infection. It is very dangerous to operate the internet without a firewall because then you will not be notified if a malicious program is trying to enter your computer and if you do not have a firewall it will not be able to protect you from malicious programs that will damage your computer. A hardware firewall is a physical device that connects to a computer and is configurable through connection to it or either through using the internet browser or through a command line…

    • 1234 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    To establish a connection, TCP uses a three-way handshake. Before a client attempts to connect with a server, the server must first bind to and listen at a port to open it up for connections: this is called a passive open. Once the passive open is established, a client may initiate an active open. To establish a connection, the three-way (or 3-step) handshake occurs:…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    8. symmetric-key: It only needs one key to encrypt the message. And both user only need the same key to decode the message. And the in order to create the key is by moving the bit. asymmetric-key: It needs two different keys- public key and private key. Everyone can see the public key and only the person who has private key can decode the message.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2) KeyGenSer(GP): Taking GP as an data or the input, this algorithm generates a private and public key combine (skS,pkS) for the data/information server.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Mat 540 Quiz

    • 3391 Words
    • 14 Pages

    | Antivirus software can detect and eliminate viruses that are trying to enter your system. Answer…

    • 3391 Words
    • 14 Pages
    Good Essays
  • Satisfactory Essays

    Information is logged on a spreadsheet and filed with the log number this is so the information can easily be found if required.…

    • 802 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Net Neutrality Outline

    • 609 Words
    • 3 Pages

    v. Net neutrality also means that carriers can't tack on an extra cost for heavy users; everyone can stream and download as much content as they like.…

    • 609 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    PKI is the most common public key encryption systems and, in most cases, this relies on manual trust and key distribution.…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cac Card

    • 1716 Words
    • 7 Pages

    Public key infrastructure (pki) certificates that enable cardholders to "sign" documents digitally, encrypt and decrypt emails, and establish secure online network connections.…

    • 1716 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Paper

    • 408 Words
    • 2 Pages

    OK, and how would you use public-private key cryptography to identify the sender of a message?…

    • 408 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It is a collection of computer programs and related data that provide an instruction to the computer and tell computer that what to do.…

    • 675 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Rsa Public Key

    • 413 Words
    • 2 Pages

    • Either of the two related keys can be used for encryption, with the other used for decryption.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Better Essays

    number theory

    • 7093 Words
    • 29 Pages

    Cryptographic systems tend to involve both an algorithm and a secret value. The secret value…

    • 7093 Words
    • 29 Pages
    Better Essays