Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
23 Cards in this Set
- Front
- Back
Hardware Theft
|
The act of stealing computer equipment.
|
|
Hardware Vandalism
|
The act of defacing or destroying computer equipment.
|
|
Software Theft
|
Computer security risk that occurs when someone (1) steals software media, (2) intentionally erases programs, (3) illegally copies a program, or (4) illegally registers and/or activates a program.
|
|
Licence Agreement
|
An agreement issued by a software manufacturer that gives the user the right to use the software.
|
|
Information Theft
|
Computer security risk that occurs when someone steals personal or confidential information.
|
|
Encryption
|
Process of converting readable data into unreadable characters to prevent unauthorized access.
|
|
Decrypt
|
Process of deciphering encrypted data into a readable form.
|
|
Encryption Algorithm
|
Set of steps that can convert readable plaintext into unreadable ciphertext.
|
|
Encryption Key
|
Set of characters that the originator of the encrypted data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
|
|
Plaintext
|
Unencrypted, readable data.
|
|
Ciphertext
|
Encrypted (scrambled) data.
|
|
Digital Signature
|
Encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender.
|
|
Digital Certificate
|
A notice that guarantees a user or a Web site is legitimate.
|
|
Certificate Authority
|
Authorized person or company that issues and verifies digital certificates.
|
|
System Failure
|
Prolonged malfunction of a computer.
|
|
Surge Protector
|
Device that uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment.
|
|
UPS
|
Device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.
|
|
Backup
|
Duplicate or copy of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
|
|
Restore
|
To copy backed up files by copying them to their original location on the computer.
|
|
WAP
|
"Wireless Access Point". A wireless network that does not broadcast a network name.
|
|
War Driving
|
ntrusion technique in which an individual attempts to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network.
|
|
WPA
|
Security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques.
|
|
802.11i
|
Network standard that conforms to government's security standards and uses more sophisticated encryption techniques than WPA. Sometimes called WPA2.
|