Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
24 Cards in this Set
- Front
- Back
Information Rights Management (IRM) |
Software that offers because the capability not only to limit access to specific files or documents, but also to specify the actions (read, copy, print, download, etc.) that individuals who are granted access to that resource can perform. Some IRM software even has the capability to limit access privileges to a specific periods of time and to remotely erase protected files. |
|
Data Loss Prevention (DLP) |
Software which works like antivirus programs in reverse, blocking outgoing messages (e-mail, instant messages, etc.) that contain key words or phrases associated with intellectual property or other sensitive data the organization wants to protect. |
|
Digital Watermark |
Code imbedded in documents that enables an organization to identify confidential information that has been disclosed. |
|
Data Masking |
A program that protects privacy by replacing personal information with fake values. |
|
Spam |
Unsolicited email that contains either advertising or offensive content. |
|
Identity Theft |
Assuming someone's identity, usually for economic gain. |
|
Cookie |
A text file created by a website and stored on a visitor's hard drive. Cookies store information about who the user is and what the user has done on the site. |
|
Encryption |
The process of transforming normal text, called plaintext, into unreadable gibberish, called ciphertext. |
|
Plaintext |
Normal text that has not been encrypted. |
|
Ciphertext |
Plaintext that was transformed into unreadable gibberish using encryption. |
|
Decryption |
Transforming ciphertext back into plaintext. |
|
Symmetric Encryption Systems |
Encryption systems that use the same key both to encrypt and decrypt. |
|
Asymmetric Encryption Systems |
Encryption systems that use two keys (one public, the other private); either key can encrypt, but only the other matching key can decrypt. |
|
Public Key |
One of the keys used in asymmetric encryption systems. It is widely distributed and available to everyone. |
|
Private Key |
One of the keys used in asymmetric encryption systems. It is kept secret and known only to the owner of that pair of public and private keys. |
|
Key Escrow |
The process of storing a copy of an encryption key in a secure location. |
|
Hashing |
Transforming plain text of any length into a short code called a hash. |
|
Hash |
Plaintext that has been transformed into short code. |
|
Non-repudiation |
Creating legally binding agreements that cannot be unilaterally repudiated by either party. |
|
Digital Signature |
A hash encrypted with the hash creator's private key. |
|
Digital Certificate |
Electronic document that certifies the identity of the owner of a particular public key and contains that party's public key. |
|
Certificate Authority |
An organization that issues public and private keys and records the public key and digital certificate. |
|
Public Key Infrastructure (PKI) |
The system for issuing pairs of public and private keys and corresponding digital certificates. |
|
Virtual Private Network VPN |
Using encryption and authentication to securely transfer information over the Internet, thereby creating a "virtual" private network. |