Author Question: __________ is the use of mathematical algorithms to transform data into a form that is not readily ... (Read 88 times)

joesmith1212

  • Hero Member
  • *****
  • Posts: 549
__________ is the use of mathematical algorithms to transform data into a form that is not readily intelligible, in which the transformation and subsequent recovery of the data depend on an algorithm and zero or more encryption keys.
 
  What will be an ideal response?

Question 2

A possible danger that might exploit a vulnerability, a _________ is a potential for violation of security which exists when there is a circumstance, capability, action, or event that could breach security and cause harm.
 
  What will be an ideal response?



LegendaryAnswers

  • Sr. Member
  • ****
  • Posts: 341
Answer to Question 1

ENCIPHERMENT

Answer to Question 2

THREAT



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Amphetamine poisoning can cause intravascular coagulation, circulatory collapse, rhabdomyolysis, ischemic colitis, acute psychosis, hyperthermia, respiratory distress syndrome, and pericarditis.

Did you know?

Malaria mortality rates are falling. Increased malaria prevention and control measures have greatly improved these rates. Since 2000, malaria mortality rates have fallen globally by 60% among all age groups, and by 65% among children under age 5.

Did you know?

Common abbreviations that cause medication errors include U (unit), mg (milligram), QD (every day), SC (subcutaneous), TIW (three times per week), D/C (discharge or discontinue), HS (at bedtime or "hours of sleep"), cc (cubic centimeters), and AU (each ear).

Did you know?

Certain chemicals, after ingestion, can be converted by the body into cyanide. Most of these chemicals have been removed from the market, but some old nail polish remover, solvents, and plastics manufacturing solutions can contain these substances.

Did you know?

Approximately 500,000 babies are born each year in the United States to teenage mothers.

For a complete list of videos, visit our video library