unit 8 comp sci vocab

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/26

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

27 Terms

1
New cards

Personally Identifiable Information (PII)

 information about an individual that identifies, links, relates, or describes them.

2
New cards

Phishing

 a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

3
New cards

Spear Phishing

the fraudulent practice of sending emails ostensibly from a known or trusted sender in order to induce targeted individuals to reveal confidential information.

4
New cards

Keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.

5
New cards

Malware

software intended to damage a computing system or to take partial control over its operation.

6
New cards

Ransomware

 denies access to your files and demands payment through Bitcoin in order for access to be granted again.

7
New cards

Adware

 a type of malware that automatically displays unwanted advertisements. Clicking on one of these ads could redirect you to a malicious site.

8
New cards

Spyware

A type of malware that functions by spying on a user’s activity. This type of spying includes monitoring a user’s activity, keystrokes and more.

9
New cards

Freeware

 software that can be downloaded for free over the internet.

10
New cards

Shareware

software that is available free of charge and often distributed informally for evaluation, after which a fee may be requested for continued use.

11
New cards

Trojan Horses

 disguises itself as a normal file and tricks users into downloading it, consequently installing malware.

12
New cards

Encryption

 a process of encoding messages to keep them secret, so only "authorized" parties can read it.

13
New cards

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text.

14
New cards

Cipher

 the generic term for a technique (or algorithm) that performs encryption.

15
New cards

Caesar Cipher

 a technique for encryption that shifts the alphabet by some number of characters.

16
New cards

Cracking Encryption

 attempting to decode a secret message without knowing all the specifics of the cipher.

17
New cards

Symmetric Key Encryption

 involves one key for both encryption and decryption.


18
New cards

Public Key Encryption

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message.

19
New cards

Multi-factor Authentication

a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access.

20
New cards

Strong Password

something that is easy for a user to remember but would be difficult for someone else to guess based on knowledge of that user. 

21
New cards

Virus

a malicious program that can copy itself and gain access to a computer in an unauthorized way. Computer viruses often attach themselves to legitimate programs and start running independently on a computer.

22
New cards

Bugs

 a type of error, flaw or failure that produces an undesirable or unexpected result; they typically exist in a website’s source code and can cause a wide range of damage.

23
New cards

Worms

 relies on security failures to replicate and spread itself to other computers; they are often hidden in attachments and will consume bandwidth and overload a web server.

24
New cards

Bots

a software program created to perform specific tasks. They can send spam or be used in a DDoS attack to bring down an entire website.

25
New cards

Distributed Denial-of-Service (DDoS) Attack

a malicious attempt to disrupt the normal traffic of a targeted server, service, or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

26
New cards

Rogue Access Point

a wireless access point that gives unauthorized access to secure networks.

27
New cards

Certificate Authority

 a trusted entity that manages and issues security certificates and public keys that are used for secure communication in a public network.