Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
22 Cards in this Set
- Front
- Back
Hardware theft
|
the act of stealing computer equipment
|
|
hardware vandalism
|
the act of defaceing or destroying computer equipment
|
|
software theft
|
stealing of software media intentially exams program copies a program or illigally registers a program
|
|
lecense agreement
|
the right to use the software buth the individual doesn't own the purse
|
|
Encription
|
the process of converting readable data into unreadable charaters to prevent unauthorized acess
|
|
decrypt
|
to decipher into a readable form of data
|
|
incryption algorithm
|
set of stees that can convert readable plaintext into unreadable ciphertext
|
|
encryption key
|
programed formula that the orgionator of the data uses to encrypt the plaintext
|
|
plaintext
|
readable data on a computer/ readable text
|
|
ciphertext
|
unreadable text on a computer/ unreadable data
|
|
digital signiture
|
encripted code that a person website organization attaches to an electronic message to verify its idenity
|
|
digital certificate
|
a notice that generates a user or a website is lagitamate
|
|
certificate authority (CA)
|
authentic person or a company that issues and vertifies digital certificates
|
|
system failure
|
prolonged malufuntion of a computer can cause loss of hardware and software
|
|
surge protector
|
uses specific electrical conponents to provide a stable current flow to the computer and other electrical equipment
|
|
UPS
|
mintextuptile power supply is a device that contains surge protection circuits and one or more batteries
|
|
back up
|
duplicate of a file that can be used if the origional is lost
|
|
Restore
|
copying the backed up files to their origional location on the computer
|
|
WAP
|
wireless acess point intruders connect to this
|
|
War Driving
|
individuals attempt to detect wireless network via their notebook computer
|
|
WPA
|
wifi procted acess is a security standard that improves on older security standards
|
|
802.IIi or WPAD2
|
most recent network security standard costome the governments security standards and uses sophisticated encripted techniques
|