Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
23 Cards in this Set
- Front
- Back
The act of stealing computer equipment.
|
Hardware Theft
|
|
The act of defacing or destroying computer equipment.
|
Hardware Vandalism
|
|
When someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers and/or activates a program.
|
Software Theft
|
|
The right to use a software.
|
License Agreement
|
|
When someone steals personal or confidential information.
|
Information Theft
|
|
The process of converting readable data into unreadable characters to prevent unauthorized access.
|
Encryption
|
|
Decipher the encryption into readable form.
|
Decrypt
|
|
A set of steps that can convert readable plaintext into unreadable ciphertext.
|
Encryption Algorithm
|
|
A programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
|
Encryption Key
|
|
The unencrypted, readable data.
|
Plaintext
|
|
The encrypted data.
|
Ciphertext
|
|
An encrypted coden that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender.
|
Digital Signature
|
|
A notice that guarantees a user or a Web site is legitimate.
|
Digital Certificate
|
|
An unauthorized person or a company that issues and verifies digital certificates.
|
Certificate Authority
|
|
The prolonged malfunction of a computer.
|
System Failure
|
|
A device that uses special electrical components to provide a stable current flow to the computer and other electrical equipment.
|
Surge Protector
|
|
A device that contains surge protection circuits and one or more batteries that can provide power during the loss of power.
|
UPS (Uninterruptable Power Supply)
|
|
A duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
|
Backup
|
|
Copying the backed up files to their original location on the computer.
|
Restore
|
|
Configured not to broadcast a network name.
|
WAP (Wireless Access Point)
|
|
When someone attempts to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network.
|
War Driving
|
|
A security standard that improves older security standards by authenticating network users and providing more advanced encryption techniques.
|
WPA (Wi-Fi Protected Access)
|
|
Conforms to the governments security standards and uses more sophistocated encryption techniques than WPA.
|
802.11i or WPA 2
|