Vocabulary Terms

Cybersecurity is an important concern for the Internet and the systems built on it.

Back to standards

Terms

Asymmetric encryption
Used in public key encryption, it is scheme in which the key to encrypt data is different from the key to decrypt
Caesar Cipher
A technique for encryption that shifts the alphabet by some number of characters
Cipher
The generic term for a technique (or algorithm) that performs encryption
Cookie
A piece of data used to store information about clients; can also be used to track users across sites
Cracking encryption
When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to "crack" the encryption
Decryption
A process that reverses encryption, taking a secret message and reproducing the original plain text
Encryption
A mechanism for hiding the original contents of data through an algorithmic process
Malware
software used to compromise systems
PII
stands for Personally Identifiable Information
Private Key
In an asymmetric encryption scheme the decryption key is kept private and never shared, so only the intended recipient has the ability to decrypt a message that has been encrypted with a public key
Public Key Encryption
Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private
Random Substitution Cipher
An encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.
Trojan
malware that sneaks into a system to create problems
Two-factor authentication
using texts or phone unlocks in addition to passwords
Virus
software that replicates and also usually has other bad outcomes