RI-CSE 7,8,9

0.0(0)
studied byStudied by 1 person
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/38

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

39 Terms

1
New cards

What is the digital divide?

an uneven distribution in access to computing devices and the Internet

2
New cards

What does PII stand for?

Personally Identifiable Information

3
New cards

What are some examples of PII?

name, thumbprint, address, SSN

4
New cards

What factors are important when creating a strong password?

length, special characters, numbers

5
New cards

Encryption

a process of encoding messages to keep them more secret, so only authorized parties know about it

6
New cards

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

7
New cards

Cipher

the generic term for a technique (or algorithm) that performs encryption

8
New cards

Caeser’s Cipher

a technique for encryption that shifts the alphabet by some number of characters

9
New cards

Cracking encryption

When you attempt to decode a secret message without knowing all the specifics of the cipher

10
New cards

What are the three different components in the digital divide?

socioeconomic, geographic, demographic

11
New cards

What two things is the internet a powerful vehicle for?

communication and freedom of expression

12
New cards

What does ISP stand for

Internet Service Provider

13
New cards

What is spoofing?

Pretending to be something else

14
New cards

What is phishing?

a way in which someone tries to trick you into sharing your personal information

15
New cards

Virus

a malicious program that self replicates through user interaction

16
New cards

Worm

a malicious program that self replicates without needing user interaction

17
New cards

Security hole

a way into a device with no security measures or with easily defeated security measures

18
New cards

Trojan horse

a type of malware pretending to be some other software to trick the user into running a malicious program

19
New cards

What does DDoS stand for?

Distributed Denial of Service

20
New cards

How is DDoS attack differ from a DoS attack?

DDoS has many computers involved in the attack

21
New cards

How to prevent being hacked?

use strong passwords, install security updates often, and check for authentic web addresses

22
New cards

socioeconomic

the amount of wealth of a person or area

23
New cards

geographic

the terrain or landscape of an area

24
New cards

demographic

the characteristics of a person or people

25
New cards

What country has the lowest rate of internet access?

North Korea

26
New cards

There are differences within a country for the digital divide, what are two major ones?

Urban and rural

27
New cards

Urban

city, has more paying customers for ISP

28
New cards

Rural

countryside, less willing payers for ISP

29
New cards

What does IoT stand for?

Internet of Things

30
New cards

What is the IoT?

Interconnected devices that all link to the internet

31
New cards

What is a Knowledge authentication?

a regular password

32
New cards

What is a biometric authentication?

face ID, voice, thumbprint

33
New cards

What is a possession authentication?

getting a confirmation text

34
New cards

How many factor authentications are there?

two factor, multi factor, one factor

35
New cards

Which is more secure

 R4!nB0w5 or rainbowsinspring

rainbowsinspring

36
New cards

Cryptography

encoding a message into unreadable text and having a key so the message can be decoded

37
New cards

infrastructure

The basic physical systems needed for the operation of a society

38
New cards

examples of infrastructure

transportation, communication, sewage, water, electricity

39
New cards

authentication

the process of verifying a user into a device or website