• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back

Information Rights Management (IRM)

Software that offers because the capability not only to limit access to specific files or documents, but also to specify the actions (read, copy, print, download, etc.) that individuals who are granted access to that resource can perform. Some IRM software even has the capability to limit access privileges to a specific periods of time and to remotely erase protected files.

Data Loss Prevention (DLP)

Software which works like antivirus programs in reverse, blocking outgoing messages (e-mail, instant messages, etc.) that contain key words or phrases associated with intellectual property or other sensitive data the organization wants to protect.

Digital Watermark

Code imbedded in documents that enables an organization to identify confidential information that has been disclosed.

Data Masking

A program that protects privacy by replacing personal information with fake values.

Spam

Unsolicited email that contains either advertising or offensive content.

Identity Theft

Assuming someone's identity, usually for economic gain.

Cookie

A text file created by a website and stored on a visitor's hard drive. Cookies store information about who the user is and what the user has done on the site.

Encryption

The process of transforming normal text, called plaintext, into unreadable gibberish, called ciphertext.

Plaintext

Normal text that has not been encrypted.

Ciphertext

Plaintext that was transformed into unreadable gibberish using encryption.

Decryption

Transforming ciphertext back into plaintext.

Symmetric Encryption Systems

Encryption systems that use the same key both to encrypt and decrypt.

Asymmetric Encryption Systems

Encryption systems that use two keys (one public, the other private); either key can encrypt, but only the other matching key can decrypt.

Public Key

One of the keys used in asymmetric encryption systems. It is widely distributed and available to everyone.

Private Key

One of the keys used in asymmetric encryption systems. It is kept secret and known only to the owner of that pair of public and private keys.

Key Escrow

The process of storing a copy of an encryption key in a secure location.

Hashing

Transforming plain text of any length into a short code called a hash.

Hash

Plaintext that has been transformed into short code.

Non-repudiation

Creating legally binding agreements that cannot be unilaterally repudiated by either party.

Digital Signature

A hash encrypted with the hash creator's private key.

Digital Certificate

Electronic document that certifies the identity of the owner of a particular public key and contains that party's public key.

Certificate Authority

An organization that issues public and private keys and records the public key and digital certificate.

Public Key Infrastructure (PKI)

The system for issuing pairs of public and private keys and corresponding digital certificates.

Virtual Private Network VPN

Using encryption and authentication to securely transfer information over the Internet, thereby creating a "virtual" private network.