The translation of data into a secret code. Encryption is the most effective way to achieve data security. To read an encrypted file, you must have access to a secret key or password that enables you to decrypt it. Unencrypted data is called plain text ; encrypted data is referred to as cipher text.
There are two main types of encryption: asymmetric encryption (also called public-key encryption) and symmetric encryption.
- encryption algorithm
A mathematical procedure for performing encryption on data. Through the use of an algorithm, information is made into meaningless cipher text and requires the use of a key to transform the data back into its original form. Blowfish, AES RC4, RC5, and RC6 are examples of encryption algorithms.
- end-user computing
Using a computer at the application level. The term end-user is used to distinguish the person for whom the product was designed from the person who programs, services, or installs the product. Developers working on a personal computer in a professional capacity, for example, are not considered end-users.
SIP or H.323 terminal or gateway. An endpoint can call and be called. It generates and terminates the information stream.
The code or software used as the basis for building a game. The game engine literally powers the entire game. Some developers license a game engine to other developers who build a new game based on the technology of the game engine.
(n.) In a biometric security system, a person who has a reference template in the system��s database. Compare with impostor.