The process of taking data and rendering it unreadable is known as which of the following Quizlet

  1. Science
  2. Computer Science
  3. Computer Security and Reliability

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (23)

Sets with similar terms

Other sets by this creator

Verified questions

COMPUTER SCIENCE

The off-line minimum problem asks us to maintain a dynamic set T of elements from the domain {1, 2, ...,n} under the operations INSERT and EXTRACT-MIN. We are given a sequence S of n INSERT and m EXTRACT-MIN calls, where each key in {1, 2, ...,n} is inserted exactly once. We wish to determine which key is returned by each EXTRACT-MIN call. Specifically, we wish to fill in an array extracted [1..m], where for i = 1, 2, ..., m, extracted [i] is the key returned by the i th EXTRACT-MIN call. The problem is “off-line” in the sense that we are allowed to process the entire sequence S before determining any of the returned keys. a. In the following instance of the off-line minimum problem, each operation INSERT (i) represented by the value of i and each EXTRACT-MIN is represented by the letter E: 4, 8, E, 3, E, 9, 2, 6, E, E, E, 1, 7, E, 5. Fill in the correct values in the extracted array. To develop an algorithm for this problem, we break the sequence S into homogeneous subsequences. That is, we represent S by $$ I_1, E, I_2, E, I_3, ..., I_m, E, I_{m+1} $$ , where each E represents a single EXTRACT-MIN call and each $$ I_j $$ represents a (possibly empty) sequence of INSERT calls. For each subsequence $$ I_j $$ , we initially place the keys inserted by these operations into a set $$ K_j $$ , which is empty if $$ I_j $$ is empty. We then do the following: OFF-LINE-MINIMUM (m, n) 1, for i = 1 to n 2, determine j such that $$ i ∈ K_j $$ 3, if j ≠ m +1 4, extracted [j] = i 5, let l be the smallest value greater than j for which set $$ K_1 $$ exists 6, $$ K_l = K_j ∪ K_l $$ , destroying $$ K_j $$ 7, return extracted b. Argue that the array extracted returned by OFF-LINE-MINIMUM is correct. c. Describe how to implement OFF-LINE-MINIMUM efficiently with a disjoint set data structure. Give a tight bound on the worst-case running time of your implementation.

Verified answer

COMPUTER SCIENCE

Verified answer

COMPUTER SCIENCE

Verified answer

COMPUTER SCIENCE

Verified answer

Recommended textbook solutions

The process of taking data and rendering it unreadable is known as which of the following Quizlet

The process of taking data and rendering it unreadable is known as which of the following Quizlet

The process of taking data and rendering it unreadable is known as which of the following Quizlet

The process of taking data and rendering it unreadable is known as which of the following Quizlet

Other Quizlet sets

Related questions

Whenever data is erased or removed from a storage media, residual data can be left behind. This can allow data to be reconstructed when the organization disposes of the media, resulting in unauthorized individuals or groups gaining access to private data. Media that security professionals must consider include magnetic hard disk drives, solid-state drives, magnetic tapes, and optical media, such as CDs and DVDs. When considering data remanence, security professionals must understand three countermeasures:

Clearing: This includes removing data from the media so that data cannot be reconstructed using normal file recovery techniques and tools. With this method, the data is only recoverable using special forensic techniques. Overwriting is a clearing technique that writes data patterns over the entire media, thereby eliminating any trace data. Another clearing technique is disk wiping.

Purging: Also referred to as sanitization, purging makes the data unreadable even with advanced forensic techniques. With this technique, data should be unrecoverable. Degaussing, a purging technique, exposes the media to a powerful, alternating magnetic field, removing any previously written data and leaving the media in a magnetically randomized (blank) state.

Destruction: Destruction involves destroying the media on which the data resides. Encryption scrambles the data on the media, thereby rendering it unreadable without the encryption key. Destruction is the physical act of destroying media in such a way that it cannot be reconstructed. Shredding involves physically breaking media to pieces. Pulverizing involves reducing media to dust. Pulping chemically alters the media. Finally, burning incinerates the media.

The majority of these countermeasures work for magnetic media. However, solid-state drives present unique challenges because they cannot be overwritten. Most solid-state drive vendors provide sanitization commands that can be used to erase the data on the drive. Security professionals should research these commands to ensure that they are effective. Another option for these drives is to erase the cryptographic key. Often a combination of these methods must be used to fully ensure that the data is removed.

Data remanence is also a consideration when using any cloud-based solution for an organization. Security professionals should be involved in negotiating any contract with a cloud-based provider to ensure that the contract covers data remanence issues, although it is difficult to determine that the data is properly removed. Using data encryption is a great way to ensure that data remanence is not a concern when dealing with the cloud.

When data is encrypted it is unreadable without the key the encrypted text is called?

Encryption secures digital data using one or more mathematical techniques known as cryptography. The information input becomes unreadable through encryption as an algorithm converts the original text, known as plaintext, into an alternative form known as ciphertext.

What tool is defined as the process of converting information into an unreadable code?

Encryption is the method by which information is converted into secret code that hides the information's true meaning. The science of encrypting and decrypting information is called cryptography. In computing, unencrypted data is also known as plaintext, and encrypted data is called ciphertext.

What is ciphertext quizlet?

What is ciphertext? Encrypted data. What is authentication? The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data.

What type of encryption algorithm is one way encryption which means that it encrypts data but the data Cannot be decrypted?

Symmetric cryptography uses a single key to encrypt and decrypt. Asymmetric cryptography uses two keys, one to encrypt and the other to decrypt. Hashing is a one-way cryptographic transformation using an algorithm, but no key.