Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

22 Cards in this Set

  • Front
  • Back
Hardware theft
the act of stealing computer equipment
hardware vandalism
the act of defaceing or destroying computer equipment
software theft
stealing of software media intentially exams program copies a program or illigally registers a program
lecense agreement
the right to use the software buth the individual doesn't own the purse
the process of converting readable data into unreadable charaters to prevent unauthorized acess
to decipher into a readable form of data
incryption algorithm
set of stees that can convert readable plaintext into unreadable ciphertext
encryption key
programed formula that the orgionator of the data uses to encrypt the plaintext
readable data on a computer/ readable text
unreadable text on a computer/ unreadable data
digital signiture
encripted code that a person website organization attaches to an electronic message to verify its idenity
digital certificate
a notice that generates a user or a website is lagitamate
certificate authority (CA)
authentic person or a company that issues and vertifies digital certificates
system failure
prolonged malufuntion of a computer can cause loss of hardware and software
surge protector
uses specific electrical conponents to provide a stable current flow to the computer and other electrical equipment
mintextuptile power supply is a device that contains surge protection circuits and one or more batteries
back up
duplicate of a file that can be used if the origional is lost
copying the backed up files to their origional location on the computer
wireless acess point intruders connect to this
War Driving
individuals attempt to detect wireless network via their notebook computer
wifi procted acess is a security standard that improves on older security standards
802.IIi or WPAD2
most recent network security standard costome the governments security standards and uses sophisticated encripted techniques