-
1 encrypted data
Data that has been converted from plaintext into ciphertext. Encrypted messages are used to disguise the content of a message when it is sent or stored. -
2 authentication data
"A scheme-specific block of data that is exchanged between the server and client during authentication. To prove its identity, the client encrypts some or all of this data with a user name and password. The client sends the encrypted data to the server, which decrypts the data and compares it to the original. If the decrypted data matches the original data, the client is authenticated." -
3 ciphertext
Data that has been encrypted.نص مشفّر -
4 private key
"The secret half of a cryptographic key pair that is used with a public key algorithm. Private keys are typically used to decrypt a symmetric session key, digitally sign data, or decrypt data that has been encrypted with the corresponding public key." -
5 sniffer
"An application or device that can read, monitor, and capture network data exchanges and read network packets. If the packets are not encrypted, a sniffer provides a full view of the data inside the packet." -
6 Encrypting File System
A Microsoft file-based encryption technology that enables users to encrypt files and folders on NTFS volumes. EFS helps protect the confidentiality of data by ensuring that only authorized users can decrypt the encrypted files or folders. -
7 EFS
A Microsoft file-based encryption technology that enables users to encrypt files and folders on NTFS volumes. EFS helps protect the confidentiality of data by ensuring that only authorized users can decrypt the encrypted files or folders. -
8 packet privacy
An authentication level in which each data packet is signed and encrypted in order to protect the entire communication between the client and server. -
9 recovery agent
A person who is issued a public key certificate for the purpose of recovering user data that is encrypted with Encrypting File System (EFS). -
10 bulk encryption
"A process in which large amounts of data, such as files, e-mail messages, or online communications sessions, are encrypted for confidentiality. It is usually done with a symmetric key algorithm." -
11 authenticator
"A data structure used by one party to prove that another party knows a secret key. In the Kerberos authentication protocol, authenticators include timestamps, to prevent replay attacks, and are encrypted with the session key issued by the Key Distribution Center (KDC)."مصدّق -
12 MD5
"An industry-standard one-way, 128-bit hashing scheme, developed by RSA Data Security, Inc., and used by various Point-to-Point Protocol (PPP) vendors for encrypted authentication."
См. также в других словарях:
Data Protection API — DPAPI (Data Protection Application Programming Interface) is a simple cryptographic application programming interface available as a built in component in Windows 2000 and later versions of Microsoft Windows operating systems. In theory the Data… … Wikipedia
Data Protection Act — The Data Protection Act (DPA) is a United Kingdom Act of Parliament. It defines a legal basis for the handling in the UK of information relating to living people. It is the main piece of legislation that governs protection of personal data in the … Wikipedia
Data protection API — DPAPI (Data Protection Application Programming Interface) is a simple cryptographic application programming interface available as a built in component in Windows 2000 and later versions of Microsoft Windows operating systems. In theory the Data… … Wikipedia
Data deduplication — In computing, data deduplication is a specialized data compression technique for eliminating coarse grained redundant data. The technique is used to improve storage utilization and can also be applied to network data transfers to reduce the… … Wikipedia
Data Encryption Standard — The Feistel function (F function) of DES General Designers IBM First publis … Wikipedia
Encrypted key exchange — (also known as EKE) is a family of password authenticated key agreement methods described by Steven M. Bellovin and Michael Merritt. [cite conference|author=S. M. Bellovin|coauthors=M. Merritt|title=Encrypted Key Exchange: Password Based… … Wikipedia
Data security — is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data. Data security is part of the larger practice of… … Wikipedia
Encrypted Key Transport — or EKT is an extension to SRTP that fits within the SRTP framework and reduces the amount of signaling control that is needed in an SRTP session. EKT securely distributes the SRTP master key and other information for each SRTP source, using SRTCP … Wikipedia
Data loss prevention software — Data Loss Prevention (DLP) is a computer security term referring to systems that identify, monitor, and protect data in use (e.g. endpoint actions), data in motion (e.g. network actions), and data at rest (e.g. data storage) through deep content… … Wikipedia
Data archaeology — refers to the art and science of recovering computer data encrypted in now obsolete media or formats. Data archaeology can also refer to recovering information from damaged electronic formats after natural or man made disasters. The term… … Wikipedia
Data masking — is the process of obscuring (masking) specific data elements within data stores. It ensures that sensitive data is replaced with realistic but not real data. The goal is that sensitive customer information is not available outside of the… … Wikipedia