A |
Algorithm |
Set of rules or steps for performing a desired operation. An algorithm can be performed by anything that can be taught or programmed to follow a specific and unambiguous set of instructions. |
B |
Backup Tapes |
Copying data on tapes for the purpose of restoring the original content in case data is lost. |
|
Block Cipher |
A block cipher a type of symmetric-key encryption algorithm that transforms a fixed-length block of plaintext (unencrypted text) data into a block of ciphertext (encrypted text) data of the same length. |
C |
California SB 1386 |
California Senate Bill requires that organizations that own or have access to personal information of California residents to notify them if the security of their information is compromised. |
|
Cipher |
Any method of encrypting text. |
|
Cipher Block Chaining Mode (CBC mode) |
Cipher block chaining (CBC) is a mode of operation for a block cipher in which a sequence of bits are encrypted as a single unit or block with a cipher key applied to the entire block. |
|
Cipher Feedback Mode (CFB mode) |
In the Cipher Feedback Mode (CFB) is data encrypted in units smaller than the block size. This mode can be used to encrypt any number of bits e.g. single bits or single characters (bytes) before sending across an insecure data link. |
|
Ciphertext |
Unreadible text resulting from encryption. |
|
Cryptography |
The art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. |
D |
Data Encryption |
The process of converting data - known as plaintext - using an algorithm to make it unreadable. |
|
Data Storage |
Memory, components, media, and devices that retain digital and computer data for. |
|
Data Storage Devices |
A device used for saving data. Data is copied it recorded on to the device. |
|
Decipher |
To convert from a code or cipher to plain text; decode. |
|
Decrypt |
To convert from a code or cipher to plain text; decode. |
|
Decryption |
Converting data from the unintelligible ciphertext back to plaintext. The reverse of Data Encryption. |
|
DES |
Data Encryption Standard (DES) is a widely-used method of data encryption using a private (secret) key that was judged so difficult to break by the U.S. government that it was restricted for exportation to other countries. DES applies a 56-bit key to each 64-bit block of data. |
E |
Electronic codebook (ECB encryption) |
A mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding cipher text value and vice versa. |
|
Electronic Data Storage |
A storage device which requires electrical power to store and retrieve saved data. |
|
Encipher |
To convert plain text into an unintelligible form by means of a cipher. |
|
Encrypt |
To convert plain text into an unintelligible form. |
|
Encryption |
The process of transforming text into an unintelligible form called cipher. |
|
Encryption Hardware |
Hardware device used to encrypt data. They are designed to work across a full range of operating systems and appear transparent to the operating system. |
|
Encryption Software |
Software used to encrypt and decrypt data, usually in the form of computer files, removable media, email messages, or in the form of packets sent over computer networks. |
G |
Gramm-Leach-Bliley Act |
This Act includes laws that govern the collection and disclosure of customers' personal financial information by financial institutions. It requires all financial institutions to design, implement and maintain safeguards to protect customer information. |
H |
HIPAA |
The Health Insurance Portability and Accountability Act (HIPAA) is a set of standards for the privacy and protection of all electronic health information. It includes a Privacy Rule and a Security Rule that requires healthcare organizations to increase the security of patient-related data. |
I |
Integrated Circuit Card (ICC) |
See Smart Card definition. |
K |
Key |
An Encryption Key is a sequence of numbers used to encrypt or decrypt data. |
O |
Output Feedback Mode (OFB mode) |
Output feedback (OFB) is a mode of operation for a block cipher. It has some similarities to the ciphertext feedback mode in that it permits encryption of differing block sizes, but has the key difference that the output of the encryption block function is the feedback (instead of the cipher text). |
P |
PCI Data Security Standard |
Payment Card Industry Data Security Standard is a set of comprehensive requirements for enhancing payment account data security |
|
Plain text |
Unencrypted text |
|
Private key |
A private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages. |
|
Public key |
A public key is a value provided by some designated authority as an encryption key that, combined with a private key derived from the public key, can be used to effectively encrypt messages. |
|
Public Key Encryption |
A form of encryption that utilizes a unique pair of keys, one (the "public key ") being openly known, and the other (the "private key "), being known only to the recipient of an encrypted message. |
S |
Sarbanes-Oxley (SOX) |
A legislation created to protect shareholders and the general public from fradulent practices. This legislation requires that financial institutions store relevant business records "not less than 5 years" - This usually effects the IT department. |
|
Secure Key Management |
Trusted users are issued a key which enables them to access encrypted data. |
|
Smart Card |
A pocket-sized card with embedded integrated circuits that can process data. This means that input is received and processed with the ICC applications and delivered as an output. |
|
Stream Cipher |
A stream cipher is a type of symmetric encryption algorithm. While block ciphers operate on large blocks of data, stream ciphers typically operate on smaller units of plaintext, usually bits. |
|
Storage Encryption |
Backup data stored is encrypted in an effort to prevent data theft and secure the kept data. |
|
Storage Encryption Appliance |
Appliance used to encrypt data. |
T |
Triple DES |
Also referred to as 3DES, a mode of the DES encryption algorithm that encrypts data three times. Three 64-bit keys are used, instead of one, for an overall key length of 192 bits. |