1/17
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Computing innovation
Includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce)
Personally Identifiable Information (PII)
information about an individual that identifies, links, relates, or describes them.
phishing
A technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
Keylogging
The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
Malware
Software intended to damage a computing system or to take partial control over its operation.
Rogue Access Point
A wireless access point that gives unauthorized access to secure networks.
Encryption
A process of encoding messages to keep them secret, so only "authorized" parties can read them.
Decryption
A process that reverses encryption, taking a secret message and reproducing the original plain text.
Symmetric Key Encryption
Involves one key for both encryption and decryption.
Public Key Encryption
Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver's private key to encrypt a message, but the receiver's private key is required to decrypt the message.
Multi-Factor Authentication
a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Each step provides a new layer of security. Fortnite 2FA
Computer Virus Scanning Software
protects a computing system against infection.
Freeware
software which the users can use free of cost. Moreover, there are no restrictions on the use limit, the number of times one can download the software, etc. Besides, it depends on the owner of the software to pose the restrictions.
Strong password
a key to a service, one that is designed to be hard for a person or program to guess.
Virus
a type of malicious software, or malware, that spreads between computers and causes damage to data and software. Computer viruses aim to disrupt systems, cause major operational issues, and result in data loss and leakage.
Cipher
the generic term for a technique (or algorithm) that performs encryption
Caesar's Cipher
a technique for encryption that shifts the alphabet by some number of characters.
Cracking encryption
When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption.