1/38
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
What is the digital divide?
an uneven distribution in access to computing devices and the Internet
What does PII stand for?
Personally Identifiable Information
What are some examples of PII?
name, thumbprint, address, SSN
What factors are important when creating a strong password?
length, special characters, numbers
Encryption
a process of encoding messages to keep them more secret, so only authorized parties know about it
Decryption
a process that reverses encryption, taking a secret message and reproducing the original plain text
Cipher
the generic term for a technique (or algorithm) that performs encryption
Caeser’s Cipher
a technique for encryption that shifts the alphabet by some number of characters
Cracking encryption
When you attempt to decode a secret message without knowing all the specifics of the cipher
What are the three different components in the digital divide?
socioeconomic, geographic, demographic
What two things is the internet a powerful vehicle for?
communication and freedom of expression
What does ISP stand for
Internet Service Provider
What is spoofing?
Pretending to be something else
What is phishing?
a way in which someone tries to trick you into sharing your personal information
Virus
a malicious program that self replicates through user interaction
Worm
a malicious program that self replicates without needing user interaction
Security hole
a way into a device with no security measures or with easily defeated security measures
Trojan horse
a type of malware pretending to be some other software to trick the user into running a malicious program
What does DDoS stand for?
Distributed Denial of Service
How is DDoS attack differ from a DoS attack?
DDoS has many computers involved in the attack
How to prevent being hacked?
use strong passwords, install security updates often, and check for authentic web addresses
socioeconomic
the amount of wealth of a person or area
geographic
the terrain or landscape of an area
demographic
the characteristics of a person or people
What country has the lowest rate of internet access?
North Korea
There are differences within a country for the digital divide, what are two major ones?
Urban and rural
Urban
city, has more paying customers for ISP
Rural
countryside, less willing payers for ISP
What does IoT stand for?
Internet of Things
What is the IoT?
Interconnected devices that all link to the internet
What is a Knowledge authentication?
a regular password
What is a biometric authentication?
face ID, voice, thumbprint
What is a possession authentication?
getting a confirmation text
How many factor authentications are there?
two factor, multi factor, one factor
Which is more secure
R4!nB0w5 or rainbowsinspring
rainbowsinspring
Cryptography
encoding a message into unreadable text and having a key so the message can be decoded
infrastructure
The basic physical systems needed for the operation of a society
examples of infrastructure
transportation, communication, sewage, water, electricity
authentication
the process of verifying a user into a device or website