• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back
Hardware theft
the act of stealing computer equipment
Hardware vandalism
the act of destroying or defacing computer equipment
Software theft
when someone steals media, erases programs, copies a program, or illegally registers a program
License agreement
the right to use the software
Information theft
when someone steals personal or confidential information
Encryption
the process of turning readable data into unreadable characters
decrypt
to decipher
Encryption algorithm
set of steps that convert readable plaintext into unreadable cipher text
Encryption key
a programmed formula that the originator of the data uses to encrypt the plaintext
Plaintext
readable data
Ciphertext
unreadable plaintext
Digital signature
an encrypted code that a person,website,or organization attaches to an electronic message
Digital Certificate
a notice that guarantees a user or website is real
Certificate authority
an authorized person or company that issues and verifies digital certificates
System failure
the prolonged malfunction of a computer
Surge protector
an item that protects against electrical power variations
UPS (Uninterpretable Power Supply)
a device that contains protection circuits and a battery for backup without power
Backup
a duplicate file, program, or disk that can be used if the original is lost or damaged
Restore
to make good again, to replace with the same item
WAP (Wireless Access Point)
a location to receive wireless internet
War driving
driving with a computer to check if wireless is at a place they suspect
WPA (Wi-Fi Protected Access)
Less sophisticated version of 802.11i
802.11i or WPA2
recent security standard with more sophisticated encryption than WPA