Mrs. Smith CSP Fall 20 Unit 10- Cybersecurity and Global Impacts

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/15

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:38 AM on 4/23/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

16 Terms

1
New cards

Computing Innovation

includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).

2
New cards

Personally Identifiable Information (PII)

information about an individual that identifies, links, relates, or describes them.

3
New cards

Phishing

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails

4
New cards

Keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

5
New cards

Malware

software intended to damage a computing system or to take partial control over its operation

6
New cards

Rogue Access Point

a wireless access point that gives unauthorized access to secure networks.

7
New cards

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

8
New cards

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text.

9
New cards

Symmetric Key Encryption

involves one key for both encryption and decryption.

10
New cards

Public Key Encryption

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message

11
New cards

Freeware

Untrustworthy (often free) downloads from freeware or shareware sites can contain malware.

12
New cards

Keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

13
New cards

Multi-factor Authentication

a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access

14
New cards

Phishing

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

15
New cards

Strong password

something that is easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user.

16
New cards

Virus

a malicious program that can copy itself and gain access to a computer in an unauthorized way. Computer viruses often attach themselves to legitimate programs and start running independently on a computer.