Select ten key terms from chapter 6, ten key terms from chapter 7, ten key terms from chapter 8 and ten key terms from chapter 9 and type the definitions of each. Upload into canvas.
chapter 6:
Digital certificate
• Dual control
• End-entity certificate
Hardware security
module (HSM)
• Hierarchical trust model
• Hybrid trust model
• Key archiving
Key escrow
• Key recovery
• Local registration
authority (LRA)
chapter 7
Certificate
Certificate Authority
(CA)
Certificate Revocation
List (CRL)
Internet Security
Association and Key
Management Protocol
(ISAKMP)
Key Terms
• IPsec
• Pretty Good Privacy
(PGP)
• Public key infrastructure
(PKI)
Secure/Multipurpose
Internet Mail Extensions
(S/MIME)
chapter 8
Access tokens
Autoplay
Biometrics
BIOS passwords
Bootdisk
• Contactless access cards
Convergence
Crossover error rate
(CER)
• Drive imaging
chapter 9
Internet Control
Message Protocol
(ICMP)
• Internet Protocol (IP)
Intranet
• Local area network
(LAN
Media Access Control
(MAC) address
• Network Address
Translation (NAT)
• Network
• Packet
• Protocol
• Ring topology