The procedure allowing recognition of an entity by a system, by and large by utilizing a unique machine-readable user name, with a "Digital ID", such as a secure server using SSL validation.
one of security's cornerstones, integrity is unimpaired or perfect condition.
This is the same as "change detection"
International Data Encryption Algorithm (IDEA)
a symmetric block cipher which uses a 128-bit key and operates on 64-bit blocks, like 128 bit encryption.
Internet Protocol security (IPsec)
(a) the IETF working society which is specifying a security architecture (RFC 2401) and protocols in order to provide services of security for Internet Protocol traffic.
(b) a collective name for that architecture and set of protocols, specifying
1.Security protocols (AH and ESP, the Authentication Header and Encapsulating Security Payload),
3.PKI key management, and
4.Algorithms for authentication and encryption.
Besides SSL encryption and also 128-bit encryption and SSL digital certificates or 128-bit SSL certificates, the set of security services include access control service, connectionless data integrity, data origin authentication for secure authentication or secure SSL authentication, protection against replays, data confidentiality service and limited traffic flow confidentiality.
Internet Security Association and Key Management Protocol (ISAKMP)
An Internet IPsec protocol (RFC 2408) used to negotiate, institute or start, modify, and delete security associations. It is also used in the exchange of key generation and authentication data, key establishment protocol, encryption algorithm, or authentication mechanism of secure authentication and validation of online transactions with SSL Certificates.