Looks like no one added any tags here yet for you.
Computing Innovation
includes a program as an integral
part of its function. Can be physical (e.g. self-driving car),
non-physical computing software (e.g. picture editing
software), or non-physical computing concepts (e.g.,
e-commerce).
Personally Identifiable Information (PII)
information about an individual that identifies, links, relates, or describes them.
Phishing
a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
Keylogging
the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
Malware
software intended to damage a computing system or to take partial control over its operation.
Rogue Access Point
a wireless access point that gives unauthorized access to secure networks.
Encryption
a process of encoding messages to keep them secret, so only "authorized" parties can read it.
Decryption
a process that reverses encryption, taking a secret message and reproducing the original plain text.
Cipher
the generic term for a technique (or algorithm) that performs encryption.
Caesar's Cipher
a technique for encryption that shifts the alphabet by some number of characters.
Cracking Encryption
When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption.
Encryption
a process of encoding messages to keep them secret, so only "authorized" parties can read it.
Decryption
a process that reverses encryption, taking a secret message and reproducing the original plain text.
Symmetric Key Encryption
involves one key for both encryption and decryption.
Public Key Encryption
pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message.
Multifactor Authentication
a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Each step provides a new layer of security.
Computer Virus Scanning Software
protects a computing system against infection.