• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back
Hardware Theft
Act of stealing computer equipment
Hardware Vandalism
Act of defacing or destroying computer equipment
Software theft
When someone steals software media, intentionally erase programs, illegally copies program or registers and activates a program
License Agreement
Right to use software
Information Theft
Someone steals person or confidential info
Encryption
converting readable data into unreadable characters
Decrypt
decipher into readable form
Encryption algorithm
Set of steps that can convert readable plain text into unreadable cipher text
Encryption key
programmed formula that the originator of the data uses to encrypt the plain text and recipient uses to decrypt cipher text
Plaintext
unencrypted readable data
Ciphertext
encrypted data
Digital Signature
encrypted code attached to an electronic message to verify the identity of the message sender
Digital Certificate
Notice that guarantees a user or website is legitimate
Certificate Authority
CA
Authorized person or company that issues and verifies digital certificates
System Failure
prolonged malfunction of a computer
Surge protector
uses special electrical components to provide a stable current flow to computer
UPS
uninterruptible power supply
Device that contains surge protection circuits and one or more batteries that can provide power during loss of power
Backup
Duplicate of file, program, or disk that can be used if original is lost, damaged, or destroyed
Restore
Copying backed up files to their original location
WAP
wireless access point, unsecured network
War Driving
Individuals detect wireless networks via notebook computer or mobile device while driving through areas they suspect have a wireless network
WPA
Wifi protected access security standard that improves on older security standards by authenticating network users
802.11i or WPA2
Most recent network security standard conforms to government security standard