- Your Needs
- What to Protect
- Security Policies
- Security Policy Requirements
- Incident Procedures
- Security Categories
- Software Vulnerability Control
- Hostile Software
- Network Layout
- Traffic Filtering
- Firewall Protection
- Network Intrusion Detection
- Network Port Scanning
- Network Tools
- Types of Attacks
- Protocol Use
- Entry Points
- Application Level Protection
- System Protection
- User Issues
- Other Recommendations
- Ciphertext - Text or data that has been enciphered such that unauthorized persons should be unable to read it.
- Cipher - A mathematical function that is used to perform encryption or decryption.
- Cryptoanalysis - The practice of analyzing ciphertext with the intent of breaking it.
- Cryptography - Science dealing with keeping messages secure.
- Cryptology - The section of mathematics that deals with cryptography and cryptoanalysis.
- Decipher - The act of taking text that is enciphered so unauthorized persons cannot read it and processing it into plain text or data that can be read or used.
- Decryption - The process of turning an encrypted message (ciphertext) back into plaintext.
- Encipher - The act of taking plain text or data nnd processing it into ciphertext so unauthorized personnel cannot read it or use it.
- Encryption - The process of hiding the contents of a message.
- One way hash functions - A function that can be easily performed one way but is difficult or impossible to reverse.
- Plaintext - Normal text or data, before the enciphering process or after the deciphering process.
- Salting - Adding random data to a password prior to performing a one way hash on it. This is a means of stopping a dictionary attack.