Professional Documents
Culture Documents
Fill in the blank. Fill the missing word or fill what is being describe.(2 pts each)
1. The collection of tools designed to protect data and to thwart hackers is called
______________
2. ______________ measures to protect data during their transmission
3. ______________ measures to protect data during their transmission over a
collection of interconnected networks
4. Any action that compromises the security of information owned by an organization
called ______________
5. ______________ is the art or science encompassing the principles and methods of
transforming an intelligible message into one that is unintelligible, and then retransforming
that message back to its original form
6. ______________ An algorithm for transforming an intelligible message into one
that is unintelligible by transposition and/or substitution methods
7. The process of converting plaintext to cipher text using a cipher and a key is called
______________ is the he original intelligible message
8. The process of converting cipher text back into plaintext using a cipher and a key is called
______________ .
9. ______________ is an algorithm for transforming an intelligible message into an
unintelligible one using a code-book
II. Multiple Choice. Select the correct answer. Write the letter only.
4. The process of converting cipher text back into plaintext using a cipher and a key
a. Decipher b. Cipher c. Cryptanalysis d. Cryptography
5. The algorithm for transforming an intelligible message into one that is unintelligible
by transposition and/or substitution methods
a. Decipher b. Cipher c. Cryptanalysis d. Cryptography
III. INTERPRETATION. Explain the flow of information and how hackers attacks from
sender to the reciever by using the following method. (5pts each)
II. Interruption
III. Modification
IV. Fabrication