unit 6 APCSP

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

abstraction layer

1 / 79

flashcard set

Earn XP

80 Terms

1

abstraction layer

The Internet is organized into several of these which are controlled by various protocols. From the bottom up, we have the link layer (Ethernet protocol), the Internet layer (IP), transport layer (TCP), and application layer (HTTP).

New cards
2

asymmetric cipher

A cipher in which separate but related keys are used for encryption and decryption.

New cards
3

bandwidth

the rate at which data is downloaded or uploaded in a network

New cards
4

biometrics

using unique physical characteristics such as finger prints, face recognition, etc. for identification

New cards
5

brute force attack

An attempt to try every possible encryption key to break a secret message.

New cards
6

certificate authority

An entity that issues digital certificates.

New cards
7

cipher

A system for creating secret messages.

New cards
8

ciphertext

unreadable, secret message.

New cards
9

client

A computer or software application that requests services from a server located on the internet -- e.g., a Web browser is an example of a client.

New cards
10

computer bug

An informal term for error in computer hardware or software -- the term was coined by Grace Hopper.

New cards
11

computing system

A group of computing devices and programs working together for a common purpose.

New cards
12

cryptography

The art and science of writing secret messages. 'secret writing'

New cards
13

debugging

The process of removing errors from computer hardware or software.

New cards
14

decryption

The process of using a secret key to convert ciphertext into plaintext.

New cards
15

diffie-hellman

An algorithm used to establish a shared secret between two parties. It is primarily used to exchange a symmetric cryptographic key among two parties, Alice and Bob, who wish to communicate securely.

New cards
16

digital certificate

A data packet that certifies the holder of a public key.

New cards
17

digital divide

the gap between those who have access to the Internet and computers and those who do not, usually affected by socioeconomic, geographic, or demographic characteristics.

New cards
18

DNS

An Internet service that translates domain names into IP addresses.

New cards
19

domain name

A hierarchical name (such as trincoll.edu) that identifies a domain and an institution on the Internet. Top levels include com, edu, gov.

New cards
20

encryption

The process of using a secret key to convert plaintext into ciphertext.

New cards
21

encryption key

A piece of secret data used in by encryption and decryption algorithms.

New cards
22

ethernet

A network that uses wires to connect computers.

New cards
23

fault-tolerant

The capability of a system to continue operating properly in the event of the failure of one or more of its components.

New cards
24

firewalls

barriers that protect a network from unauthorized access

New cards
25

frequency analysis

This is performed by counting the occurrence of the letters in an encrypted message in an effort to discover patterns that might reveal the encryption key.

New cards
26

function

A procedure that computes and returns a value.

New cards
27

host

A computer that's connected directly to the Internet -- often a computer that provides certain services or resources.

New cards
28

HTML

A language for formatting Web pages.

New cards
29

HTTP

The set of rules that governs the WWW application.

New cards
30

https

A protocol for secure (trusted, encrypted) communication over the Internet.

New cards
31

Internet Service Provider

A company that provides customers with Internet access.

New cards
32

intractable

A computational problem is labeled this if the only known way to solve the problem depends on an exponential algorithm.

New cards
33

IP Address

A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.

New cards
34

IPv4

An older 32 bit IP address

New cards
35

IPv6

A newer 128 bit IP address which allows for many more devices to be addressed.

New cards
36

key exchange problem

The problem of sharing a secret key between Alice and Bob, without Eve, an eavesdropper, being able to intercept it.

New cards
37

keylogger

a program to record every keystroke made by a computer user.

New cards
38

LAN

A network that connects computers within a school or home.

New cards
39

latency

a measure of the time it takes for a piece of data to reach its destination

New cards
40

local variables

Variables that are declared and exist only inside a procedure or function (this is called their scope).

New cards
41

malware

Software intended to damage a computing system or to take partial control over its operation.

New cards
42

malware scanning software

Software that helps to protect a computing system against malware infections.

New cards
43

modem

A device that connects a computer to an Internet Service Provider (ISP).

New cards
44

multi-factor authentication (MFA)

users are asked to present several separate pieces of evidence involving knowledge (something they know like a password), possession (something they have like a texted code), and/or inherence (something they are like biometrics).

New cards
45

network

A group of two or more computers that are linked together.

New cards
46

one time pad

An example of perfect (unbreakable) encryption, which is achieved by using, only once, a random polyalphabetic key that is as long the message itself.

New cards
47

packet

A collection of data used by the TCP/IP protocol to transmit data across the Internet. Each packet contains routing data as well as the content of the message.

New cards
48

packet sniffer

Software used by network administrators to monitor data being transmitted over a network. In the wrong hands, it can be used to steal email messages and other information.

New cards
49

packet switching

The method by which information is transmitted through the Internet. Information is broken into packets and each packet is routed independently from source to destination.

New cards
50

phishing

a technique that is used to trick a user into providing personal information usually through email.

New cards
51

ping

A networking utility used by network administrators to test the reachability of a host on the Internet.

New cards
52

plaintext

An unencrypted, readable message.

New cards
53

polyalphabetic substitution

In this system, multiple alphabets are used to encrypt a single message.

New cards
54

protocol

A system of rules that govern the behavior of some system.

New cards
55

public key cryptography

A cryptographic system that uses two keys -- a public key known to everyone and a private or secret key known only to the recipient of the message. When Bob wants to send a secure message to Alice, he uses Alice's public key to encrypt the message. Alice then uses her private key to decrypt it.

New cards
56

ransomware

malware that encrypts and locks computer systems until a ransom is paid.

New cards
57

rogue access point

Gives unauthorized access to secure networks.

New cards
58

router

A device that transmits data between two different networks.

New cards
59

routing

The process of finding a path from sender to receiver.

New cards
60

RSA

A cryptosystem for public-key encryption, and is widely used for securing sensitive data, particularly when being sent over an insecure network such as the Internet.

New cards
61

run-time error

A mistake in the program that occurs during the execution of a program.

New cards
62

scalability

The capacity for the system to change in size and scale to meet new demands.

New cards
63

semantic error

An error in which the program is not working as it is designed to work.

New cards
64

server

A host that provides some kind of service -- e.g., Google's Gmail service.

New cards
65

SMTP/POP

Sets of rules that govern the email servcies.

New cards
66

SSL

A protocol for establishing an encrypted link between a web server and a browser.

New cards
67

strong password

A series of characters that is easy for a user to remember, but would be difficult for someone else to guess based on knowledge of that user.

New cards
68

substitution cipher

A cipher in which letters from a ciphertext alphabet are substituted for the letters in a plaintext message in a systematic way.

New cards
69

symmetric cipher

A cipher in which a single key is used for both encryption and decryption.

New cards
70

syntax error

An error that results from a violation of the programming language grammatical rules.

New cards
71

traceroute

A networking utility used to trace the route and measure delays of packets moving through the Internet.

New cards
72

transposition cipher

In this cipher, letters in the plaintext are rearraged without substitution.

New cards
73

Trojan horse

a malicious program that disguises itself as a useful program that unsuspecting users download.

New cards
74

trust model

The use of a trusted third party to verify the trustworthiness of a digital certificate.

New cards
75

URI

WWW identifier that uniquely identifies a resource on the WWW -- e.g., http://host.com'.

New cards
76

virus

a malicious program that can copy itself and gain access to a computer in an unauthorized way

New cards
77

WAN

A network that connects devices over a broad geographic region -- e.g., a telephone network.

New cards
78

wifi

A network that uses radio waves to connect devices (computers, smart phones, printers).

New cards
79

World Wide Web

An Internet application that is based on the HTTP protocol.

New cards
80

worm

a malicious program that spreads by itself through networks of computers

New cards

Explore top notes

note Note
studied byStudied by 11 people
... ago
5.0(2)
note Note
studied byStudied by 37 people
... ago
4.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(1)
note Note
studied byStudied by 24 people
... ago
5.0(1)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 63 people
... ago
5.0(1)
note Note
studied byStudied by 32 people
... ago
5.0(1)
note Note
studied byStudied by 4 people
... ago
4.0(1)

Explore top flashcards

flashcards Flashcard (30)
studied byStudied by 63 people
... ago
5.0(2)
flashcards Flashcard (54)
studied byStudied by 34 people
... ago
5.0(1)
flashcards Flashcard (73)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 616 people
... ago
4.0(4)
flashcards Flashcard (56)
studied byStudied by 47 people
... ago
5.0(3)
flashcards Flashcard (33)
studied byStudied by 241 people
... ago
4.7(3)
flashcards Flashcard (38)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (242)
studied byStudied by 6 people
... ago
5.0(1)
robot