Author Question: __________ is the use of mathematical algorithms to transform data into a form that is not readily ... (Read 89 times)

joesmith1212

  • Hero Member
  • *****
  • Posts: 549
__________ is the use of mathematical algorithms to transform data into a form that is not readily intelligible, in which the transformation and subsequent recovery of the data depend on an algorithm and zero or more encryption keys.
 
  What will be an ideal response?

Question 2

A possible danger that might exploit a vulnerability, a _________ is a potential for violation of security which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
 
  What will be an ideal response?



LegendaryAnswers

  • Sr. Member
  • ****
  • Posts: 341
Answer to Question 1

ENCIPHERMENT

Answer to Question 2

THREAT



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Individuals are never “cured” of addictions. Instead, they learn how to manage their disease to lead healthy, balanced lives.

Did you know?

Every 10 seconds, a person in the United States goes to the emergency room complaining of head pain. About 1.2 million visits are for acute migraine attacks.

Did you know?

About one in five American adults and teenagers have had a genital herpes infection—and most of them don't know it. People with genital herpes have at least twice the risk of becoming infected with HIV if exposed to it than those people who do not have genital herpes.

Did you know?

In most cases, kidneys can recover from almost complete loss of function, such as in acute kidney (renal) failure.

Did you know?

Ether was used widely for surgeries but became less popular because of its flammability and its tendency to cause vomiting. In England, it was quickly replaced by chloroform, but this agent caused many deaths and lost popularity.

For a complete list of videos, visit our video library