Author Question: __________ is the use of mathematical algorithms to transform data into a form that is not readily ... (Read 43 times)

joesmith1212

  • Hero Member
  • *****
  • Posts: 549
__________ is the use of mathematical algorithms to transform data into a form that is not readily intelligible, in which the transformation and subsequent recovery of the data depend on an algorithm and zero or more encryption keys.
 
  What will be an ideal response?

Question 2

A possible danger that might exploit a vulnerability, a _________ is a potential for violation of security which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
 
  What will be an ideal response?



LegendaryAnswers

  • Sr. Member
  • ****
  • Posts: 341
Answer to Question 1

ENCIPHERMENT

Answer to Question 2

THREAT



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Glaucoma is a leading cause of blindness. As of yet, there is no cure. Everyone is at risk, and there may be no warning signs. It is six to eight times more common in African Americans than in whites. The best and most effective way to detect glaucoma is to receive a dilated eye examination.

Did you know?

Alcohol acts as a diuretic. Eight ounces of water is needed to metabolize just 1 ounce of alcohol.

Did you know?

Bacteria have been found alive in a lake buried one half mile under ice in Antarctica.

Did you know?

Children with strabismus (crossed eyes) can be treated. They are not able to outgrow this condition on their own, but with help, it can be more easily corrected at a younger age. It is important for infants to have eye examinations as early as possible in their development and then another at age 2 years.

Did you know?

In ancient Rome, many of the richer people in the population had lead-induced gout. The reason for this is unclear. Lead poisoning has also been linked to madness.

For a complete list of videos, visit our video library