Computer Science Illuminated Ch 17 Vocab

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/40

flashcard set

Earn XP

Description and Tags

Cybersecurity

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

41 Terms

1
New cards
Antivirus software
Software designed to detect, remove, and/or prevent malicious software
2
New cards
Authentication credentials
Information users provide to identify themselves
3
New cards
Availability
The degree to which authorized users can access information for legitimate purposes
4
New cards
Back door
A program feature that gives special and unauthorized access to a software system to anyone who knows it exists
5
New cards
Biometrics
Using physiological characteristics, such as fingerprints, to identify users and control access
6
New cards
Buffer overflow
A defect in a computer program that could cause a system to crash and leave the user with heightened privileges
7
New cards
Caesar cipher
A substitution cipher that shifts characters a certain number of positions in the alphabet
8
New cards
CAPTCHA
A software mechanism used to verify that a web form is submitted by a human and not an automated program
9
New cards
Cipher
An algorithm used to encrypt and decrypt text
10
New cards
Confidentiality
Ensuring that data is protected from unauthorized access
11
New cards
Cryptanalysis
The process of decrypting a message without knowing the cipher or key used to encrypt it
12
New cards
Cryptography
The field of study related to encoded information
13
New cards
Decryption
The process of converting ciphertext into plaintext
14
New cards
Denial of service
An attack on a network resource that prevents authorized users from accessing the system
15
New cards
Digital certificate
A representation of a sender’s authenticated public key used to minimize malicious forgeries
16
New cards
Digital signature
Data that is appended to a message, made from the message itself and the sender’s private key, to ensure the authenticity of the message
17
New cards
Encryption
The process of converting plaintext into ciphertext
18
New cards
Fingerprint analysis
A technique used for user authentication that compares a scanned fingerprint to a stored copy of the authorized user’s fingerprint
19
New cards
GPS (Global Positioning System)
A system that uses satellites to pinpoint the location of any GPS receiver
20
New cards
Information security
The techniques and policies used to ensure proper access to data
21
New cards
Integrity
Ensuring that data can be modified only by appropriate mechanisms
22
New cards
Logic bomb
A malicious program that is set up to execute when a specific system event occurs
23
New cards
Malicious code (malware)
A computer program that attempts to bypass appropriate authorization safeguards and/or perform unauthorized functions
24
New cards
Man-in-the-middle
A security attack in which network communication is intercepted in an attempt to obtain key data
25
New cards
Password criteria
A set of rules that must be followed when creating a password
26
New cards
Password guessing
An attempt to gain access to a computer system by methodically trying to determine a user’s password
27
New cards
Password management software
A program that helps you manage sensitive data, such as passwords, in a secure manner
28
New cards
Phishing
Using a web page to masquerade as part of a trusted system to trick users into revealing security information
29
New cards
Public-key cryptography
An approach to cryptography in which each user has two related keys, one public and one private
30
New cards
Risk analysis
Determining the nature and likelihood of the risks to key data
31
New cards
Route cipher
A transposition cipher that lays out a message in a grid and traverses it in a particular way
32
New cards
Security policy
A written statement describing the constraints or behavior an organization embraces regarding the information provided by its users
33
New cards
Smart card
A card with an embedded memory chip used to identify users and control access
34
New cards
Spoofing
An attack on a computer system in which a malicious user masquerades as an authorized user
35
New cards
Substitution cipher
A cipher that substitutes one character with another
36
New cards
Transposition cipher
A cipher that rearranges the order of the characters in a message
37
New cards
Trojan horse
A malicious program disguised as a benevolent resource
38
New cards
User authentication
The process of verifying the credentials of a particular user of a computer or software system
39
New cards
Virus
A malicious, self-replicating program that embeds itself into other code
40
New cards
Wiki
A website whose content can be created and edited by multiple users
41
New cards
Worm
A malicious stand-alone program that often targets network resources