Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

23 Cards in this Set

  • Front
  • Back
Act of stealing computer equipment.
Hardware Theft
Act of defacing or destroying computer equipment.
Hardware Vandalism
When someone steals software media, intentionally erases programs, illegally copies them, or illegally registers or activates a program.
Software Theft
The right to use the software.
license agreement
Occurs when someone steals personal or confidential information.
Information Theft
Process of converting readable data into unreadable characters to prevent unauthorized access.
(decipher) Converting encrypted data into readable form.
Set of steps that can convert readable plaintext into unreadable ciphertext.
Encryption Algorithm
Programmed formula that the originator of the data uses to encrypt plaintext and the recipient to decrypt the ciphertext.
Encryption Key
Unencrypted, readable data
Encrypted data
Cipher text
Encrypted code that a person, Web site, or organization attaches to an electronic message sender.
Digital Signature
Is a notice that guarentees a user or a Web site is legitimate.
Digital Certificate
Authorized person or company that issues and verifies digital certificates.
Certificate Authority
Prolonged malfunctions of a computer.
System failure
Special electronic components that provide a stable current flow to the computer and other electronic equipment.
surge protector
Device that contains surge protection circuits and one or more batteries that can provide power during a loss of power.
UPS uninterruptible power supply
Deplicate file, program, or disk that can be used if the original is lost, damaged, or stolen.
Copying the backed up files to their original location on the computer.
Connection to a wireless network.
WAP (wireless access point)
Individuals attempt to detect wireless networks via their notebook or mobile device while driving a vehicle through areas that might have a wireless network.
War Driving
Security standard that improves on older security standards by authenticating network users.
WPA (wi-fi protected access)
Conforms to the government's security standards and uses more sophisticated encryption techniques than WPA.
802.lli or WPA2