Safe Computing Vocab

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

Personally Identifiable Information (PII)

any data that can be used to identify, locate, or contact an individual (name, address, SSN, etc.)

2
New cards

Multi-factor authentication

use of several authentication techniques together, such as passwords and security tokens

3
New cards

Password

a word or phrase that you must type for access to an encrypted file or system (ideally letters, numbers, and symbols)

4
New cards

Encryption

process of converting readable data into unreadable characters to prevent unauthorized access

5
New cards

Symmetric Key Encryption

uses the same key for performing the encryption and decryption

6
New cards

Asymmetric Key Encryption

encryption method that uses different keys to encrypt and decrypt the data

7
New cards

Computer Virus

a destructive program that destroys or harms data on a computer

8
New cards

Malware

software designed to infiltrate or damage a computer system without the user's permission

9
New cards

Phishing

the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers

10
New cards

Keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

11
New cards

Hacking

invading someone else's computer without the owner's knowledge, usually for personal gain or just for the satisfaction of invading someone else's computer

12
New cards

Biometric Authentication

uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users

13
New cards

Trojan Horse

a program that appears desirable but actually contains something harmful

14
New cards

Worm

a software program capable of reproducing itself that can spread from one computer to the next over a network

15
New cards

Ransomware

a type of malicious software designed to block access to a computer system until a sum of money is paid

16
New cards

Adware

a software program that delivers advertising content in a manner that is unexpected and unwanted by the user

17
New cards

Spyware

software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive

18
New cards

Spam

unwanted e-mail (usually of a commercial nature sent out in bulk)

19
New cards

DDOS Attack

hacker floods a server with numerous bogus requests through numerous bots so that legitimate users can no longer access the server due to crashes or slower speeds (Distributed Denial of Service)

20
New cards

Rogue Access Points

the attacker sets up an unsecured wireless network near the enterprise with an identical name and intercepts any messages sent by unsuspecting users that log onto it

21
New cards

Virus Protection

preventing a computer virus from infecting a computer by using special software and common sense

22
New cards

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text

23
New cards

Geolocation

the identification of the location of a person or object using technology

24
New cards

Cookies

small computer programs left behind on your computer when you visit a website that track your behavior and transactions

25
New cards

Malicious Link

a link created with the purpose of promoting scams, attacks and frauds

26
New cards

Unsolicited Emails

spam

27
New cards

CIA Triad

defines the target areas when developing a secure system includes confidentiality (limiting authorization to only those with access), integrity (making sure info is accessible and not tampered with), and availability (ensuring those that are allowed to view info can)

28
New cards

Brute Force Attack

an attack on passwords or encryption that tries every possible password or encryption key

29
New cards

Dictionary Attack

a password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file

30
New cards

Freeware

software that is provided without charge

31
New cards

Shareware

copyrighted software that is distributed at no cost for a trial period

32
New cards

Facial Recognition

a biometric method that identifies people based on facial features

33
New cards

Fingerprint Recognition

a type of security that analyzes ridges and valleys (minutiae) on the surface tips of human fingers

34
New cards

Iris Scan Recognition

a biometric identification method that analyzes the unique patterns in a person's iris to identify them

35
New cards

TLS/SSL

Transport Layer Security / Secure Sockets Layer - cryptographic protocols designed for secure communications

36
New cards

Digital Certificate

an electronic document that certifies the identity of the owner of a particular public key and contains that party's public key