• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back
The act of stealing computer equipment.
Hardware Theft
The act of defacing or destroying computer equipment.
Hardware Vandalism
When someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers and/or activates a program.
Software Theft
The right to use a software.
License Agreement
When someone steals personal or confidential information.
Information Theft
The process of converting readable data into unreadable characters to prevent unauthorized access.
Encryption
Decipher the encryption into readable form.
Decrypt
A set of steps that can convert readable plaintext into unreadable ciphertext.
Encryption Algorithm
A programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
Encryption Key
The unencrypted, readable data.
Plaintext
The encrypted data.
Ciphertext
An encrypted coden that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender.
Digital Signature
A notice that guarantees a user or a Web site is legitimate.
Digital Certificate
An unauthorized person or a company that issues and verifies digital certificates.
Certificate Authority
The prolonged malfunction of a computer.
System Failure
A device that uses special electrical components to provide a stable current flow to the computer and other electrical equipment.
Surge Protector
A device that contains surge protection circuits and one or more batteries that can provide power during the loss of power.
UPS (Uninterruptable Power Supply)
A duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
Backup
Copying the backed up files to their original location on the computer.
Restore
Configured not to broadcast a network name.
WAP (Wireless Access Point)
When someone attempts to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network.
War Driving
A security standard that improves older security standards by authenticating network users and providing more advanced encryption techniques.
WPA (Wi-Fi Protected Access)
Conforms to the governments security standards and uses more sophistocated encryption techniques than WPA.
802.11i or WPA 2