• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back
hardware theft
is the act of stealing computer equipment.
hardware vandalism
is the act of defacing or destroying computer equipment.
software theft
occurs when someone steals software media intentionally erases programs, illegal copies or program, or illegally registers and/or activities a program.
license agreement
is the right to use the software.
information theft
occurs when someone steals personal or confidential information.
encryption
is the process of convering readable data into unreadable characters to prevent unauthorized access.
decrypt
or decipher, it into a readable form.
encryption algorithm
is a set of steps that canconvert readable plaintext into unreadable ciphertext.
encryption key
is a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
plaintext
unencrypted, readable data.
ciphertext
encrypted data, unreadable.
digital signature
is an encrypted code that a person, web site, or organization attaches to an electronic message to verify the identity of the message sender.
digital certificate
is a notice that guarantees a user or a web site is legitimate.
certificate authority
(CA) is an authorized person or a company that issues and verifies digital certificates.
system failure
is the prolonged malfunction of a computer.
surge protector
uses special electricalcomponents to provide a stable current flow to the computer and other electronic equipment.
UPS
(uninterruptable power supply) is a device that contains surge protection circuits and one or more batteries that can provide power during a loss of power.
backup
is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
restore
in case of a system failure or the discovery of corrupted files you restore the files by copying the backed up files to their original location on the computer.
WAP
(wireless access point) connection to a network which is unsecure.
war driving
individuals attempt to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network.
WPA
(wi-fi protected access) is a security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques.
802. 11i or WPA2
the most recent network security standard, conforms to the government's security standards and uses more sophisticated encryption techniques then WPA.