100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

C836 CHAPTER 1-6 WGU, With Complete Verified Solution. 2024.

Beoordeling
-
Verkocht
-
Pagina's
8
Cijfer
A+
Geüpload op
01-05-2024
Geschreven in
2023/2024

C836 CHAPTER 1-6 WGU, With Complete Verified Solution. 2024. FISMA (Federal Information Security Modernization Act) this law provides a framework for ensuring the effectiveness of information security controls in federal government - changed from Management (2002) to Modernization in 2014 HIPAA (Health Insurance Portability and Accountability Act) this law improves the efficiency and effectiveness of the health care system and protects patient privacy FERPA (Family Educational Rights and Privacy Act) this law protects the privacy of students and their parents SOX (Sarbanes-Oxley Act) this law regulates the financial practice and governance of corporations GLBA (Gramm-Leach-Bliley Act) this law protects the customers of financial institutions compliance relating to an organization's adherence to laws, regulations, and standards regulatory compliance Regulations mandated by law usually requiring regular audits and assessments industry compliance Regulations or standards designed for specific industries that may impact ability to conduct business (e.g. PCI DSS) privacy the state or condition of being free from being observed or disturbed by other people The Federal Privacy Act of 1974 This act safeguards privacy through the establishment of procedural and substantive rights in personal data privacy rights Rights relating to the protection of an individual's personal information PII (Personally Identifiable Information) Information that can be used to identify an individual, and should be protected as sensitive data and monitored for compliance cryptography the science of keeping information secure Cryptanalysis The science of breaking through the encryption used to create ciphertext cryptology The overarching field of study that covers cryptography and cryptanalysis cryptographic algorithm (cipher) The specifics of the process used to encrypt plaintext or decrypt ciphertext plaintext (cleartext) unencrypted data ciphertext encrypted data Caesar cipher an ancient cryptographic technique based on transposition; involves shifting each letter of a plaintext message by a certain number of letters (historically 3) ROT13 cipher a more recent cipher that uses the same mechanism as the Caesar cipher but moves each letter 13 places forward symmetric key cryptography (private key cryptography) uses a single key for both encryption of the plaintext and decryption of the ciphertext block cipher A type of cipher that takes a predetermined number of bits in the plaintext message (commonly 64 bits) and encrypts that block stream cipher A type of cipher that encrypts each bit in the plaintext message, 1 bit at a time AES (Advanced Encryption Standard) A set of symmetric block ciphers endorsed by the US government through NIST. Shares the same block modes that DES uses and also includes other modes such as XEX-based Tweaked CodeBook (TCB) mode asymmetric key cryptography (public key cryptography) this method uses 2 keys, a public key and a private key SSL (secure sockets layer) a protocol that uses the RSA algorithm (an asymmetric algorithm) to secure web and email traffic hash function (message digest) keyless cryptography that creates a largely unique and fixed-length hash value based on the original mesage hash used to determine whether the message has changed; provides integrity (but not confidentiality) digital signature a method of securing a message that involves generating a hash and encrypting it using a private key certificate created to link a public key to a particular individual; used as a form of electronic identification for that person CA (certificate authority) a trusted entity that handles digital certificates PKI (public key infrastructure) infrastructure that includes the CAs that issue and verify certificates and the RAs that verify the identity of the individuals associated with the certificates RA (registration authority) An authority in a PKI that verifies the identity of the individual associated with the certificate CRL (Certificate Revocation List) a public list that holds all the revoked certifications for a certain period of time data at rest Data that is on a storage device of some kind and is not moving

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

C836 CHAPTER 1-6 WGU, With Complete Verified
Solution. 2024.

FISMA (Federal Information Security Modernization Act)
this law provides a framework for ensuring the effectiveness of information security
controls in federal government
- changed from Management (2002) to Modernization in 2014
HIPAA (Health Insurance Portability and Accountability Act)
this law improves the efficiency and effectiveness of the health care system and
protects patient privacy
FERPA (Family Educational Rights and Privacy Act)
this law protects the privacy of students and their parents
SOX (Sarbanes-Oxley Act)
this law regulates the financial practice and governance of corporations
GLBA (Gramm-Leach-Bliley Act)
this law protects the customers of financial institutions
compliance
relating to an organization's adherence to laws, regulations, and standards
regulatory compliance
Regulations mandated by law usually requiring regular audits and assessments
industry compliance
Regulations or standards designed for specific industries that may impact ability to
conduct business (e.g. PCI DSS)
privacy
the state or condition of being free from being observed or disturbed by other people
The Federal Privacy Act of 1974
This act safeguards privacy through the establishment of procedural and substantive
rights in personal data
privacy rights
Rights relating to the protection of an individual's personal information
PII (Personally Identifiable Information)
Information that can be used to identify an individual, and should be protected as
sensitive data and monitored for compliance
cryptography
the science of keeping information secure
Cryptanalysis
The science of breaking through the encryption used to create ciphertext
cryptology
The overarching field of study that covers cryptography and cryptanalysis
cryptographic algorithm (cipher)
The specifics of the process used to encrypt plaintext or decrypt ciphertext
plaintext (cleartext)
unencrypted data
ciphertext
encrypted data

, Caesar cipher
an ancient cryptographic technique based on transposition; involves shifting each letter
of a plaintext message by a certain number of letters (historically 3)
ROT13 cipher
a more recent cipher that uses the same mechanism as the Caesar cipher but moves
each letter 13 places forward
symmetric key cryptography (private key cryptography)
uses a single key for both encryption of the plaintext and decryption of the ciphertext
block cipher
A type of cipher that takes a predetermined number of bits in the plaintext message
(commonly 64 bits) and encrypts that block
stream cipher
A type of cipher that encrypts each bit in the plaintext message, 1 bit at a time
AES (Advanced Encryption Standard)
A set of symmetric block ciphers endorsed by the US government through NIST. Shares
the same block modes that DES uses and also includes other modes such as XEX-
based Tweaked CodeBook (TCB) mode
asymmetric key cryptography (public key cryptography)
this method uses 2 keys, a public key and a private key
SSL (secure sockets layer)
a protocol that uses the RSA algorithm (an asymmetric algorithm) to secure web and
email traffic
hash function (message digest)
keyless cryptography that creates a largely unique and fixed-length hash value based
on the original mesage
hash
used to determine whether the message has changed;
provides integrity (but not confidentiality)
digital signature
a method of securing a message that involves generating a hash and encrypting it using
a private key
certificate
created to link a public key to a particular individual;
used as a form of electronic identification for that person
CA (certificate authority)
a trusted entity that handles digital certificates
PKI (public key infrastructure)
infrastructure that includes the CAs that issue and verify certificates and the RAs that
verify the identity of the individuals associated with the certificates
RA (registration authority)
An authority in a PKI that verifies the identity of the individual associated with the
certificate
CRL (Certificate Revocation List)
a public list that holds all the revoked certifications for a certain period of time
data at rest
Data that is on a storage device of some kind and is not moving

Geschreven voor

Vak

Documentinformatie

Geüpload op
1 mei 2024
Aantal pagina's
8
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€7,06
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
TopGradeSolutions Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
80
Lid sinds
1 jaar
Aantal volgers
9
Documenten
12906
Laatst verkocht
21 uur geleden
TOPGRADESOLUTIONS

Here we offer revised study materials to elevate your educational outcomes. We have verified learning materials (Research, Exams Questions and answers, Assignments, notes etc) for different courses guaranteed to boost your academic results. We are dedicated to offering you the best services and you are encouraged to inquire further assistance from our end if need be. Having a wide knowledge in Nursing, trust us to take care of your Academic materials and your remaining duty will just be to Excel. Remember to give us a review, it is key for us to understand our clients satisfaction. We highly appreciate clients who always come back for more of the study content we offer, you are extremely valued. All the best.

Lees meer Lees minder
4,9

170 beoordelingen

5
159
4
7
3
3
2
0
1
1

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen