5.6 safe computing

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

PII- personally identifiable information

information about an individual that identifies, links, describes them. such as SSN, age, race, phone number, medical info, financial info, biometric data

2
New cards

viruses

executable program that gets installed (usually unintentionally) and harms the user and its computer

3
New cards

phishing

send large amounts of fake email to trick people into sending confidential information. people log into fake accounts and give personal data that allows hackers to get into their real accounts

4
New cards

keylogging

use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and together PIL

5
New cards

Rouge access point

wireless access point that gives unauthorized accesses to secure networks

6
New cards

malware

general name for programs that try to affect your computer

7
New cards

multifactor authentication

method of computer access control in which a user is only granted access after successfully presenting several separate prices of evidence to an authentication mechanism (usually at least 2 of the following)

8
New cards

cryptography

the art of writing or solving codes

9
New cards

encryption

scrambling or changing a message to hide the original content

10
New cards

decryption

process of unscrambling a message to make it readable

11
New cards

key

longer key makes for more difficult decryption. most sited currently use 256 big keys. as computers get faster keys must grow. standard key length is now 256 bits.

12
New cards

symmetric encryption

uses the same secret key to encode and decode messages. requires face to face meeting to agree on key

13
New cards

public key (asymmetric) encryption

uses 2 different keys: one for encryption (public key) and another for decryption (private key)

14
New cards

how do virus get on a computer

  1. fake install- deception about programs purpose (often disguised as security update)

  2. software vulnerability- security backdoor exists

15
New cards

what type of damage can a virus do an your computer

  1. steal or delete files

  2. control programs

  3. allow remote operation

16
New cards

DDOS- distributed denial of service

hacks overwhelm the website with too many requests (its “distributed” when the attack comes from multiple computers)

17
New cards

bot net

network of infected computers

18
New cards

zombie computers

infected computers

19
New cards

ways to avoid being hacked

  1. strong passwords

  2. check for authentic web addressed

  3. install system security updates often

  4. don’t install software you don’t trust

20
New cards

firewall

limits the kinds of connections outsiders can make to your computer

21
New cards

BUGS

errors in software. any program can have them. security bugs can crash your computer and allow spy software to collect what you type. software developers try to prevent and fix them with “updates” but updates are not always available quickly and users don’t always update the software

22
New cards

what makes a message too hard to crack

too many possibilities to compute in a reasonable amount of time

23
New cards

security protocols

SSl & TLS security protocols in use of any time you see HTTPS and or lock icon