1/11
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
computing innovation
Includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).
decryption
The process that takes a secret message and reproduces the original plain text.
encryption
The process of encoding messages to keep them secret, so only "authorized" parties can read it.
keylogging
The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
malware
Software intended to damage a computing system or to take partial control over its operation.
multi-factor authentication
A system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access.
Personally Identifiable Information (PII)
Information about an individual that identifies, links, relates, or describes them.
phishing
A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails
public key encryption
Encryption method that pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message.
rogue access point
A wireless access point that gives unauthorized access to secure networks.
symmetric key encryption
Encryption method that involves one key for both encryption and decryption.
computer virus scanning software
Protects a computing system against infection.