COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
The process of converting data into an unreadable and unusable form. Encryption is done to prevent unauthorized access of data, especially during data transmission over the Internet.
A
encryption
B
decryption
C
cookie
D
backup
Explanation: 

Detailed explanation-1: -Data encryption converts data from a readable, plaintext format into an unreadable, encoded format: ciphertext. Users and processes can only read and process encrypted data after it is decrypted. The decryption key is secret, so it must be protected against unauthorized access.

Detailed explanation-2: -An Internet security protocol that ensures secure data communication by encrypting the information transmitted. The SSL protocol certifies that a Web site is genuine and ensures that the data provided to the site is not misused.

Detailed explanation-3: -Full Disk Encryption (FDE) or whole disk encryption protects the entire volume and all files on the drive against unauthorized access. In contrast to FDE, File-Level Encryption (FLE) is an encryption method, which takes place on the file system level, enabling the encryption of data in individual files and directories.

Detailed explanation-4: -Two types of encryption algorithms can be used by the encryption key server: symmetric algorithms and asymmetric algorithms. Symmetric, or secret key encryption, uses a single key for both encryption and decryption. Symmetric key encryption is used for encrypting large amounts of data efficiently.

Detailed explanation-5: -The Principle of Confidentiality Confidentiality prevents the disclosure of information to unauthorized people, resources and processes. Another term for confidentiality is privacy.

There is 1 question to complete.