Author Question: __________ is the use of mathematical algorithms to transform data into a form that is not readily ... (Read 86 times)

joesmith1212

  • Hero Member
  • *****
  • Posts: 549
__________ is the use of mathematical algorithms to transform data into a form that is not readily intelligible, in which the transformation and subsequent recovery of the data depend on an algorithm and zero or more encryption keys.
 
  What will be an ideal response?

Question 2

A possible danger that might exploit a vulnerability, a _________ is a potential for violation of security which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
 
  What will be an ideal response?



LegendaryAnswers

  • Sr. Member
  • ****
  • Posts: 341
Answer to Question 1

ENCIPHERMENT

Answer to Question 2

THREAT



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

An identified risk factor for osteoporosis is the intake of excessive amounts of vitamin A. Dietary intake of approximately double the recommended daily amount of vitamin A, by women, has been shown to reduce bone mineral density and increase the chances for hip fractures compared with women who consumed the recommended daily amount (or less) of vitamin A.

Did you know?

The first oncogene was discovered in 1970 and was termed SRC (pronounced "SARK").

Did you know?

Fungal nail infections account for up to 30% of all skin infections. They affect 5% of the general population—mostly people over the age of 70.

Did you know?

According to the Migraine Research Foundation, migraines are the third most prevalent illness in the world. Women are most affected (18%), followed by children of both sexes (10%), and men (6%).

Did you know?

Most fungi that pathogenically affect humans live in soil. If a person is not healthy, has an open wound, or is immunocompromised, a fungal infection can be very aggressive.

For a complete list of videos, visit our video library