• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back
Hardware Theft
The act of stealing computer equipment.
Hardware Vandalism
The act of defacing or destroying computer equipment.
Software Theft
Computer security risk that occurs when someone (1) steals software media, (2) intentionally erases programs, (3) illegally copies a program, or (4) illegally registers and/or activates a program.
Licence Agreement
An agreement issued by a software manufacturer that gives the user the right to use the software.
Information Theft
Computer security risk that occurs when someone steals personal or confidential information.
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
Decrypt
Process of deciphering encrypted data into a readable form.
Encryption Algorithm
Set of steps that can convert readable plaintext into unreadable ciphertext.
Encryption Key
Set of characters that the originator of the encrypted data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
Plaintext
Unencrypted, readable data.
Ciphertext
Encrypted (scrambled) data.
Digital Signature
Encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender.
Digital Certificate
A notice that guarantees a user or a Web site is legitimate.
Certificate Authority
Authorized person or company that issues and verifies digital certificates.
System Failure
Prolonged malfunction of a computer.
Surge Protector
Device that uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment.
UPS
Device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.
Backup
Duplicate or copy of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
Restore
To copy backed up files by copying them to their original location on the computer.
WAP
"Wireless Access Point". A wireless network that does not broadcast a network name.
War Driving
ntrusion technique in which an individual attempts to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network.
WPA
Security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques.
802.11i
Network standard that conforms to government's security standards and uses more sophisticated encryption techniques than WPA. Sometimes called WPA2.