Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
23 Cards in this Set
- Front
- Back
Hardware theft
|
the act of stealing computer equipment
|
|
Hardware vandalism
|
the act of destroying or defacing computer equipment
|
|
Software theft
|
when someone steals media, erases programs, copies a program, or illegally registers a program
|
|
License agreement
|
the right to use the software
|
|
Information theft
|
when someone steals personal or confidential information
|
|
Encryption
|
the process of turning readable data into unreadable characters
|
|
decrypt
|
to decipher
|
|
Encryption algorithm
|
set of steps that convert readable plaintext into unreadable cipher text
|
|
Encryption key
|
a programmed formula that the originator of the data uses to encrypt the plaintext
|
|
Plaintext
|
readable data
|
|
Ciphertext
|
unreadable plaintext
|
|
Digital signature
|
an encrypted code that a person,website,or organization attaches to an electronic message
|
|
Digital Certificate
|
a notice that guarantees a user or website is real
|
|
Certificate authority
|
an authorized person or company that issues and verifies digital certificates
|
|
System failure
|
the prolonged malfunction of a computer
|
|
Surge protector
|
an item that protects against electrical power variations
|
|
UPS (Uninterpretable Power Supply)
|
a device that contains protection circuits and a battery for backup without power
|
|
Backup
|
a duplicate file, program, or disk that can be used if the original is lost or damaged
|
|
Restore
|
to make good again, to replace with the same item
|
|
WAP (Wireless Access Point)
|
a location to receive wireless internet
|
|
War driving
|
driving with a computer to check if wireless is at a place they suspect
|
|
WPA (Wi-Fi Protected Access)
|
Less sophisticated version of 802.11i
|
|
802.11i or WPA2
|
recent security standard with more sophisticated encryption than WPA
|