1/30
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
personal identifiable information (PII)
information about an individual, such as Social Security number, age, race, phone number(s)
data breach
the unauthorized access or retrieval of confidential or otherwise protected data
cookies
small blocks of data created by a web server, while a user is browsing a website, to remember user information and preferences.
phishing
the practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information
malware
software that is intended to do harm or damage
keylogger
the use of a program to record every keystroke made by a computer user to gain fraudulent access to passwords and other confidential information
rogue access point
a wireless access point that gives unauthorized access to secure networks
cryptography
the science and art of delivering a message securely and confidentially
encryption
the process of converting plaintext to ciphertext
decrypt
the process of converting a ciphertext into plaintext
substitution cypher
a cipher in which each letter in an alphabet is replaced with a different character or symbolkey
key
part of a key-value data structure often referred to as key-value pairs. Each key maps to a value.
brute force
a method for determining a solution to a problem by sequentially testing all possible solutions
private key encryption
an encryption method where the sender and receiver share a private key to use in the encryption algorithm
symmetric key
a key that is used for both encryption and decryption in public key encryption
public key encryption
an encryption method that uses two keys, a public key available to everyone and a private key belonging to one owner
paired keys
two keys that are related in such a way that one can be used to encrypt data, which can then only be decrypted by the other key
symmetric encryption
an encryption method in which the same key is used for both encryption and decryption. It is also called shared key encryption.
RSA algorithm
an example of public key encryption developed by Ronald Rivest, Adi Shamir, and Leonard Adleman. The algorithm is named after them and also shares its name with RSA, the company they cofounded.
SSL certificate
a digital document used to verify the authenticity of a server or public key. SSL stands for Secure Sockets Layer.
authenticates
to verify a user's identity
certificate authority
a business or organization that issues a digital certificate verifying that a given public key is owned by the entity named on the certificate
system administrators
a person responsible for managing computers, networks, servers, and other computing resources for an organization or group
brute force attack
an attempt to discover information, especially passwords, through trial and error. Attackers try as many passwords or phrases as possible, hoping one of the guesses is correct.
authorization
to give permission; for example, to access information
authentication
to verify a user's identity
multi-factor authentication
a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism
GUI
currently the dominant method for designing human-computer interaction
API
specifications for how the procedures in a library behave and can be used
Widgets
a standard component of a graphical user interface (GUI)
arguments
the variable or value that a program provides to a function or subroutine