Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
23 Cards in this Set
- Front
- Back
hardware theft
|
is the act of stealing computer equipment.
|
|
hardware vandalism
|
is the act of defacing or destroying computer equipment.
|
|
software theft
|
occurs when someone steals software media intentionally erases programs, illegal copies or program, or illegally registers and/or activities a program.
|
|
license agreement
|
is the right to use the software.
|
|
information theft
|
occurs when someone steals personal or confidential information.
|
|
encryption
|
is the process of convering readable data into unreadable characters to prevent unauthorized access.
|
|
decrypt
|
or decipher, it into a readable form.
|
|
encryption algorithm
|
is a set of steps that canconvert readable plaintext into unreadable ciphertext.
|
|
encryption key
|
is a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
|
|
plaintext
|
unencrypted, readable data.
|
|
ciphertext
|
encrypted data, unreadable.
|
|
digital signature
|
is an encrypted code that a person, web site, or organization attaches to an electronic message to verify the identity of the message sender.
|
|
digital certificate
|
is a notice that guarantees a user or a web site is legitimate.
|
|
certificate authority
|
(CA) is an authorized person or a company that issues and verifies digital certificates.
|
|
system failure
|
is the prolonged malfunction of a computer.
|
|
surge protector
|
uses special electricalcomponents to provide a stable current flow to the computer and other electronic equipment.
|
|
UPS
|
(uninterruptable power supply) is a device that contains surge protection circuits and one or more batteries that can provide power during a loss of power.
|
|
backup
|
is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
|
|
restore
|
in case of a system failure or the discovery of corrupted files you restore the files by copying the backed up files to their original location on the computer.
|
|
WAP
|
(wireless access point) connection to a network which is unsecure.
|
|
war driving
|
individuals attempt to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network.
|
|
WPA
|
(wi-fi protected access) is a security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques.
|
|
802. 11i or WPA2
|
the most recent network security standard, conforms to the government's security standards and uses more sophisticated encryption techniques then WPA.
|