Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
23 Cards in this Set
- Front
- Back
Act of stealing computer equipment.
|
Hardware Theft
|
|
Act of defacing or destroying computer equipment.
|
Hardware Vandalism
|
|
When someone steals software media, intentionally erases programs, illegally copies them, or illegally registers or activates a program.
|
Software Theft
|
|
The right to use the software.
|
license agreement
|
|
Occurs when someone steals personal or confidential information.
|
Information Theft
|
|
Process of converting readable data into unreadable characters to prevent unauthorized access.
|
Encryption
|
|
(decipher) Converting encrypted data into readable form.
|
Decryption
|
|
Set of steps that can convert readable plaintext into unreadable ciphertext.
|
Encryption Algorithm
|
|
Programmed formula that the originator of the data uses to encrypt plaintext and the recipient to decrypt the ciphertext.
|
Encryption Key
|
|
Unencrypted, readable data
|
Plaintext
|
|
Encrypted data
|
Cipher text
|
|
Encrypted code that a person, Web site, or organization attaches to an electronic message sender.
|
Digital Signature
|
|
Is a notice that guarentees a user or a Web site is legitimate.
|
Digital Certificate
|
|
Authorized person or company that issues and verifies digital certificates.
|
Certificate Authority
|
|
Prolonged malfunctions of a computer.
|
System failure
|
|
Special electronic components that provide a stable current flow to the computer and other electronic equipment.
|
surge protector
|
|
Device that contains surge protection circuits and one or more batteries that can provide power during a loss of power.
|
UPS uninterruptible power supply
|
|
Deplicate file, program, or disk that can be used if the original is lost, damaged, or stolen.
|
Backup
|
|
Copying the backed up files to their original location on the computer.
|
restore
|
|
Connection to a wireless network.
|
WAP (wireless access point)
|
|
Individuals attempt to detect wireless networks via their notebook or mobile device while driving a vehicle through areas that might have a wireless network.
|
War Driving
|
|
Security standard that improves on older security standards by authenticating network users.
|
WPA (wi-fi protected access)
|
|
Conforms to the government's security standards and uses more sophisticated encryption techniques than WPA.
|
802.lli or WPA2
|