Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
23 Cards in this Set
- Front
- Back
Hardware Theft
|
Act of stealing computer equipment
|
|
Hardware Vandalism
|
Act of defacing or destroying computer equipment
|
|
Software theft
|
When someone steals software media, intentionally erase programs, illegally copies program or registers and activates a program
|
|
License Agreement
|
Right to use software
|
|
Information Theft
|
Someone steals person or confidential info
|
|
Encryption
|
converting readable data into unreadable characters
|
|
Decrypt
|
decipher into readable form
|
|
Encryption algorithm
|
Set of steps that can convert readable plain text into unreadable cipher text
|
|
Encryption key
|
programmed formula that the originator of the data uses to encrypt the plain text and recipient uses to decrypt cipher text
|
|
Plaintext
|
unencrypted readable data
|
|
Ciphertext
|
encrypted data
|
|
Digital Signature
|
encrypted code attached to an electronic message to verify the identity of the message sender
|
|
Digital Certificate
|
Notice that guarantees a user or website is legitimate
|
|
Certificate Authority
|
CA
Authorized person or company that issues and verifies digital certificates |
|
System Failure
|
prolonged malfunction of a computer
|
|
Surge protector
|
uses special electrical components to provide a stable current flow to computer
|
|
UPS
|
uninterruptible power supply
Device that contains surge protection circuits and one or more batteries that can provide power during loss of power |
|
Backup
|
Duplicate of file, program, or disk that can be used if original is lost, damaged, or destroyed
|
|
Restore
|
Copying backed up files to their original location
|
|
WAP
|
wireless access point, unsecured network
|
|
War Driving
|
Individuals detect wireless networks via notebook computer or mobile device while driving through areas they suspect have a wireless network
|
|
WPA
|
Wifi protected access security standard that improves on older security standards by authenticating network users
|
|
802.11i or WPA2
|
Most recent network security standard conforms to government security standard
|