Backup Data Encryption, Tape Encryption & Cryptography Glossary Free glossaries at TanslationDirectory.com translation jobs
Home Free Glossaries Free Dictionaries Post Your Translation Job! Free Articles Jobs for Translators

Backup Data Encryption, Tape Encryption & Cryptography Glossary

By Paul Glen,
paul [at] relevantsitecontent . com

http://www.theq3.com/glossary.php






Become a member of TranslationDirectory.com at just $8 per month (paid per year)


Advertisements:



Use the search bar to look for terms in all glossaries, dictionaries, articles and other resources simultaneously



A Algorithm Set of rules or steps for performing a desired operation. An algorithm can be performed by anything that can be taught or programmed to follow a specific and unambiguous set of instructions.
B Backup Tapes Copying data on tapes for the purpose of restoring the original content in case data is lost.
  Block Cipher A block cipher a type of symmetric-key encryption algorithm that transforms a fixed-length block of plaintext (unencrypted text) data into a block of ciphertext (encrypted text) data of the same length.
C California SB 1386 California Senate Bill requires that organizations that own or have access to personal information of California residents to notify them if the security of their information is compromised.
  Cipher Any method of encrypting text.
  Cipher Block Chaining Mode (CBC mode)

Cipher block chaining (CBC) is a mode of operation for a block cipher in which a sequence of bits are encrypted as a single unit or block with a cipher key applied to the entire block.

  Cipher Feedback Mode (CFB mode)

In the Cipher Feedback Mode (CFB) is data encrypted in units smaller than the block size. This mode can be used to encrypt any number of bits e.g. single bits or single characters (bytes) before sending across an insecure data link.

Ciphertext Unreadible text resulting from encryption.
  Cryptography The art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text.
D Data Encryption The process of converting data - known as plaintext - using an algorithm to make it unreadable.
  Data Storage Memory, components, media, and devices that retain digital and computer data for.
  Data Storage Devices A device used for saving data. Data is copied it recorded on to the device.
  Decipher To convert from a code or cipher to plain text; decode.
  Decrypt To convert from a code or cipher to plain text; decode.
  Decryption Converting data from the unintelligible ciphertext back to plaintext. The reverse of Data Encryption.
  DES Data Encryption Standard (DES) is a widely-used method of data encryption using a private (secret) key that was judged so difficult to break by the U.S. government that it was restricted for exportation to other countries. DES applies a 56-bit key to each 64-bit block of data.
E Electronic codebook (ECB encryption) A mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding cipher text value and vice versa.
  Electronic Data Storage A storage device which requires electrical power to store and retrieve saved data.
  Encipher To convert plain text into an unintelligible form by means of a cipher.
  Encrypt To convert plain text into an unintelligible form.
  Encryption The process of transforming text into an unintelligible form called cipher.
  Encryption Hardware Hardware device used to encrypt data. They are designed to work across a full range of operating systems and appear transparent to the operating system.
  Encryption Software Software used to encrypt and decrypt data, usually in the form of computer files, removable media, email messages, or in the form of packets sent over computer networks.
G Gramm-Leach-Bliley Act This Act includes laws that govern the collection and disclosure of customers' personal financial information by financial institutions. It requires all financial institutions to design, implement and maintain safeguards to protect customer information.
H HIPAA The Health Insurance Portability and Accountability Act (HIPAA) is a set of standards for the privacy and protection of all electronic health information. It includes a Privacy Rule and a Security Rule that requires healthcare organizations to increase the security of patient-related data.
I Integrated Circuit Card (ICC) See Smart Card definition.
K Key An Encryption Key is a sequence of numbers used to encrypt or decrypt data.
O Output Feedback Mode (OFB mode) Output feedback (OFB) is a mode of operation for a block cipher. It has some similarities to the ciphertext feedback mode in that it permits encryption of differing block sizes, but has the key difference that the output of the encryption block function is the feedback (instead of the cipher text).
P PCI Data Security Standard Payment Card Industry Data Security Standard is a set of comprehensive requirements for enhancing payment account data security
  Plain text Unencrypted text
  Private key A private or secret key is an encryption/decryption key known only to the party or parties that exchange secret messages.
  Public key A public key is a value provided by some designated authority as an encryption key that, combined with a private key derived from the public key, can be used to effectively encrypt messages.
  Public Key Encryption A form of encryption that utilizes a unique pair of keys, one (the "public key ") being openly known, and the other (the "private key "), being known only to the recipient of an encrypted message.
S Sarbanes-Oxley (SOX) A legislation created to protect shareholders and the general public from fradulent practices. This legislation requires that financial institutions store relevant business records "not less than 5 years" - This usually effects the IT department.
  Secure Key Management Trusted users are issued a key which enables them to access encrypted data.
Smart Card A pocket-sized card with embedded integrated circuits that can process data. This means that input is received and processed with the ICC applications and delivered as an output.
  Stream Cipher A stream cipher is a type of symmetric encryption algorithm. While block ciphers operate on large blocks of data, stream ciphers typically operate on smaller units of plaintext, usually bits.
  Storage Encryption Backup data stored is encrypted in an effort to prevent data theft and secure the kept data.
  Storage Encryption Appliance Appliance used to encrypt data.
T Triple DES Also referred to as 3DES, a mode of the DES encryption algorithm that encrypts data three times. Three 64-bit keys are used, instead of one, for an overall key length of 192 bits.

Provided by Q3 Storage Security back up tape encryption appliance: Provides complete security for backup tapes without affecting performance and Q3i tape drive with built in encryption. Simple and non-intrusive. Installation in minutes.

 

Published - July 2009





Find free glossaries at TranslationDirectory.com

Find free dictionaries at TranslationDirectory.com

Subscribe to free TranslationDirectory.com newsletter

Need more translation jobs from translation agencies? Click here!

Translation agencies are welcome to register here - Free!

Freelance translators are welcome to register here - Free!

Submit your glossary or dictionary for publishing at TranslationDirectory.com



 



Free Newsletter

Subscribe to our free newsletter to receive news from us:

 

Menu

Use More Glossaries
Use Free Dictionaries
Use Free Translators
Submit Your Glossary
Read Translation Articles
Register Translation Agency
Submit Your Resume
Obtain Translation Jobs
Subscribe to Free Newsletter
Buy Database of Translators
Obtain Blacklisted Agencies
Vote in Polls for Translators
Read News for Translators
Advertise Here
Read our FAQ
Read Testimonials
Use Site Map

Advertisements

translation directory

christianity portal
translation jobs


 

 
Copyright © 2003-2017 by TranslationDirectory.com
Legal Disclaimer
Site Map