Unformatted text preview: l with the description. (2 points)
A. Authentication B. Authorization C. Defense - in- Depathth
D. Demilitarized zone (DMZ) E. Encryption F. Firewall
________ The process of transforming normal text, called plaintext, into unreadable gibberish, called ciphertext.
________ Restricting access of users to specific portions of the system as well as specific tasks
________ The process of turni...
View Full Document
This document was uploaded on 03/13/2014.
- Spring '14