Quiz 2.1.1-2.1.4

0.0(0)
studied byStudied by 4 people
0.0(0)
full-widthCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/30

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No study sessions yet.

31 Terms

1
New cards

personal identifiable information (PII)

 information about an individual, such as Social Security number, age, race, phone number(s)

2
New cards

data breach

 the unauthorized access or retrieval of confidential or otherwise protected data

3
New cards

cookies

small blocks of data created by a web server, while a user is browsing a website, to remember user information and preferences.

4
New cards

phishing

 the practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information

5
New cards

malware

software that is intended to do harm or damage

6
New cards

keylogger

the use of a program to record every keystroke made by a computer user to gain fraudulent access to passwords and other confidential information

7
New cards

rogue access point

a wireless access point that gives unauthorized access to secure networks

8
New cards

cryptography

the science and art of delivering a message securely and confidentially

9
New cards

encryption

the process of converting plaintext to ciphertext

10
New cards

decrypt

the process of converting a ciphertext into plaintext

11
New cards

substitution cypher

a cipher in which each letter in an alphabet is replaced with a different character or symbolkey

12
New cards

key

part of a key-value data structure often referred to as key-value pairs. Each key maps to a value.

13
New cards

brute force

a method for determining a solution to a problem by sequentially testing all possible solutions

14
New cards

private key encryption

an encryption method where the sender and receiver share a private key to use in the encryption algorithm

15
New cards

symmetric key

a key that is used for both encryption and decryption in public key encryption

16
New cards

public key encryption

 an encryption method that uses two keys, a public key available to everyone and a private key belonging to one owner

17
New cards

paired keys

two keys that are related in such a way that one can be used to encrypt data, which can then only be decrypted by the other key

18
New cards

symmetric encryption

an encryption method in which the same key is used for both encryption and decryption. It is also called shared key encryption.

19
New cards

RSA algorithm

an example of public key encryption developed by Ronald Rivest, Adi Shamir, and Leonard Adleman. The algorithm is named after them and also shares its name with RSA, the company they cofounded.

20
New cards

SSL certificate

a digital document used to verify the authenticity of a server or public key. SSL stands for Secure Sockets Layer.

21
New cards

authenticates

to verify a user's identity

22
New cards

certificate authority

a business or organization that issues a digital certificate verifying that a given public key is owned by the entity named on the certificate

23
New cards

system administrators

a person responsible for managing computers, networks, servers, and other computing resources for an organization or group

24
New cards

brute force attack

an attempt to discover information, especially passwords, through trial and error. Attackers try as many passwords or phrases as possible, hoping one of the guesses is correct.

25
New cards

authorization

to give permission; for example, to access information

26
New cards

authentication

to verify a user's identity

27
New cards

multi-factor authentication

 a method of computer access control in which a user is only granted access after successfully presenting several separate pieces of evidence to an authentication mechanism

28
New cards

GUI

currently the dominant method for designing human-computer interaction

29
New cards

API

specifications for how the procedures in a library behave and can be used


30
New cards

Widgets

 a standard component of a graphical user interface (GUI)

31
New cards

arguments

the variable or value that a program provides to a function or subroutine