• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back
Act of stealing computer equipment.
Hardware Theft
Act of defacing or destroying computer equipment.
Hardware Vandalism
When someone steals software media, intentionally erases programs, illegally copies them, or illegally registers or activates a program.
Software Theft
The right to use the software.
license agreement
Occurs when someone steals personal or confidential information.
Information Theft
Process of converting readable data into unreadable characters to prevent unauthorized access.
Encryption
(decipher) Converting encrypted data into readable form.
Decryption
Set of steps that can convert readable plaintext into unreadable ciphertext.
Encryption Algorithm
Programmed formula that the originator of the data uses to encrypt plaintext and the recipient to decrypt the ciphertext.
Encryption Key
Unencrypted, readable data
Plaintext
Encrypted data
Cipher text
Encrypted code that a person, Web site, or organization attaches to an electronic message sender.
Digital Signature
Is a notice that guarentees a user or a Web site is legitimate.
Digital Certificate
Authorized person or company that issues and verifies digital certificates.
Certificate Authority
Prolonged malfunctions of a computer.
System failure
Special electronic components that provide a stable current flow to the computer and other electronic equipment.
surge protector
Device that contains surge protection circuits and one or more batteries that can provide power during a loss of power.
UPS uninterruptible power supply
Deplicate file, program, or disk that can be used if the original is lost, damaged, or stolen.
Backup
Copying the backed up files to their original location on the computer.
restore
Connection to a wireless network.
WAP (wireless access point)
Individuals attempt to detect wireless networks via their notebook or mobile device while driving a vehicle through areas that might have a wireless network.
War Driving
Security standard that improves on older security standards by authenticating network users.
WPA (wi-fi protected access)
Conforms to the government's security standards and uses more sophisticated encryption techniques than WPA.
802.lli or WPA2