Caesar Cipher {Ans: A technique for encryption that shifts the alphabet by some number of characters}Sticky Bit {Ans: When applied to a directory it specifies that only the owner of any file in the directory can rename, move, or delete the file}Key Security Concepts {Ans: Confidentiality, Integrity and Availability}Job Rotation {Ans: Limits the amount of time that individuals can manipulate security configurations}Superuser {Ans: Is exempt from usual access control restrictions and has system wide access}Symmetric Encryption {Ans: Same key is used to encrypt as well as decrypt}Advanced Encryption Standard (AES) {Ans: Developed in 1999 by Rijndael}Public Key Infrastructure (PKI) {Ans: System for creating public and private keys using a certificate authority (CA) and digital certificates for authentication}Countermeasure {Ans: An action, device, procedure, or technique that reduces a threat, a vulnerability, or an attack by eliminating pr preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken}Data Encryption Standard (DES) {Ans: Encrypt with one key}Cipher Block Chaining (CBC) {Ans: A process in which each block of unencrypted text is XORed with the block of cipher text immediately preceding