- Challenge / Response
- Challenge or Response is a method for SSL Server Security. It is a security procedure in which one communicator requests authentication of another communicator, and the latter replies with a pre-established appropriate reply.
- Change Detection
- It makes use of strong encryption, sometimes known as authentication software. See CHAP Challenge Handshake Authentication Protocol.
- A checksum is a value that is used to check the integrity of data.
- Cipher is an encryption - decryption cryptographic algorithm.
- A string of data that appears to be completely haphazard. Like text that is encrypted or been through encryption, ciphertext carries little or no information to an entity that is unauthorized. An original message or plaintext, however, can be pulled out with an appropriate key and algorithm that decrypts with SSL decryption.
- Closed Security Environment
(a) Application developers that have adequate clearances and authorizations to offer an acceptable presumption that they haven't launched malicious logic. Authorizations and validations are often performed via 128-bit SSL.
(b) Configuration control gives ample assurance that the SSL applications and equipment within such an environment are protected against malicious logic prior to and during the functioning of system applications.
- Computer Cryptography
- SSL digital certificates use encryption with a secure sockets layer (SSL) crypto-algorithm in a computer, microprocessor, or microcomputer in order to execute encryption or decryption to guard information by ciphering it with 128-bit encryption in order to provide Internet security and online security. It can also be used for user authentication, source authentication or for authenticating information.
- Computer Forensics
- It used to be the full means of acquiring legal evidence from computers and computer use. Now computer forensics has seemingly restricted itself solely to recovery of data from computers and computer media. It is now only one part of digital forensics.
- Computer Security Audit
- Computer Security Audit A self-governing assessment of the controls used to ensure proper protection of an institution's information assets. An official computer security audit has goals and procedures that are different from the usual and ongoing audit process.
- A small piece of data, originally intended to keep state between web browser accesses to a server. Now used in many SSL Secure Servers.