A cryptographic protocol that provides communications privacy over the Internet, allows client/ server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery is called ____________
The act of analyzing a software system for vulnerabilities, examining potential threats associated with those vulnerabilities, and evaluating the resulting security risks is called _________
An encryption method where each user has two keys: a public key which is shared with all users and a private key which is kept secret and known only to the user is called ___