Author Question: __________ is the use of mathematical algorithms to transform data into a form that is not readily ... (Read 97 times)

joesmith1212

  • Hero Member
  • *****
  • Posts: 549
__________ is the use of mathematical algorithms to transform data into a form that is not readily intelligible, in which the transformation and subsequent recovery of the data depend on an algorithm and zero or more encryption keys.
 
  What will be an ideal response?

Question 2

A possible danger that might exploit a vulnerability, a _________ is a potential for violation of security which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
 
  What will be an ideal response?



LegendaryAnswers

  • Sr. Member
  • ****
  • Posts: 341
Answer to Question 1

ENCIPHERMENT

Answer to Question 2

THREAT



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

The training of an anesthesiologist typically requires four years of college, 4 years of medical school, 1 year of internship, and 3 years of residency.

Did you know?

Coca-Cola originally used coca leaves and caffeine from the African kola nut. It was advertised as a therapeutic agent and "pickerupper." Eventually, its formulation was changed, and the coca leaves were removed because of the effects of regulation on cocaine-related products.

Did you know?

Many of the drugs used by neuroscientists are derived from toxic plants and venomous animals (such as snakes, spiders, snails, and puffer fish).

Did you know?

The people with the highest levels of LDL are Mexican American males and non-Hispanic black females.

Did you know?

For pediatric patients, intravenous fluids are the most commonly cited products involved in medication errors that are reported to the USP.

For a complete list of videos, visit our video library