Home
Explore
Exams
Search for anything
Login
Get started
Home
Engineering
Computer Science
Computer Science Illuminated - Chapter 17
0.0
(0)
Rate it
Studied by 0 people
Learn
Practice Test
Spaced Repetition
Match
Flashcards
Card Sorting
1/57
Earn XP
Description and Tags
Computer Science
10th
Add tags
Study Analytics
All
Learn
Practice Test
Matching
Spaced Repetition
Name
Mastery
Learn
Test
Matching
Spaced
No study sessions yet.
58 Terms
View all (58)
Star these 58
1
New cards
Information security
techniques and policies used to ensure proper access to protected data
2
New cards
CIA triad
synthesis of confidentiality, integrity, and availability
3
New cards
Confidentiality
ensuring data is protected from unauthorized access
4
New cards
Integrity
ensuring that data can be changed only by appropriate mechanisms
5
New cards
Availability
degree of authorized users' access to information for legitimate purposes
6
New cards
Risk analysis
process of figuring out nature and likelihood of risks to key data
7
New cards
What principle is used by information security experts through having redundant checks and/or approvals needed for key activities?
concept of separating available data management privileges to avoid individuals to have an impact on system
8
New cards
User authentication
process of verifying credentials of a user on a computer or software system
9
New cards
Authentication credentials
info used for identification
10
New cards
Smart card
card embedded with a memory chip used to identify users and control access
11
New cards
Name three general types of authentication credentials
1) username, password, PIN
2) smart card
3) biometrics
12
New cards
Biometrics
using physiological characteries to identify users and control access
13
New cards
General criteria for creating a password
6 or more characters
1 uppercase/lowercase
1 digit
1 special character
14
New cards
Password criteria
set of rules that must be followed when creating a password
15
New cards
Password management software
program that helps you manage sensitive data in a secure manner
16
New cards
CAPTCHA
software mechanism used to verify that web form is submitted by a human and not a computer
17
New cards
What does CAPTCHA stand for?
Completely
Automated
Public
Turing (test to tell)
Computers (and)
Humans
Apart
18
New cards
reCAPTCHA
Software that helps digitize books at the same time
19
New cards
Fingerprint analysis
scanning technique used for user authentication by copying user's fingerprint
20
New cards
Malicious code/malware
computer program that tries to bypass authorization safeguards and/or perform unauthorized functions
21
New cards
Computer virus
malicious, self-replicating program that embeds itself into other codes
22
New cards
Worm
malicious stand-alone program that often targets network resources
23
New cards
Trojan horse
malicious program disguised as a benevolent resource
24
New cards
Logic bomb
malicious program that's set up to execute when specific system event occurs
25
New cards
Antivirus software
software for detecting/removing/preventing malicious software
26
New cards
Signature detection
software that looks for recognizable patterns of malware within executable code and removes it
27
New cards
Heuristics
strategies used to identify general patterns of malicious codes
28
New cards
Password guessing
attempt to get access to computer system by repeatedly guessing/using different passwords to get user's password
29
New cards
Phishing
technique that tries to look like a trusted web page to trick users to reveal their security information
30
New cards
Spoofing
attack on computer system where malicious user disguises self as an authorized user
31
New cards
Back door
program feature that allows special access into computer system or application to anyone who knows it exists
32
New cards
Buffer overflow
defect in program that can cause system crashes and leave user with heightened privileges
33
New cards
Denial of service (DoS)
network resource attack preventing authorized users from accessing the system
34
New cards
Man-in-the-middle
security attack where network communication is intercepted in attempt to obtain key data
35
New cards
Cryptography
field of study related to encoded information
36
New cards
Encryption
process of converting plaintext into ciphertext
37
New cards
Decryption
translating ciphertext into plaintext
38
New cards
Cipher
algorithm used to perform particular type of encryption and decryption
39
New cards
Substitution ciphers
cipher that substitutes one character with another
40
New cards
Caesar cipher
substitution cipher that shifts characters certain number of positions in alphabet
41
New cards
Transposition ciphers
cipher that rearranges characters order in a message
42
New cards
Route cipher
transposition cipher that lays out message in a grid and traverses it in a particular way
43
New cards
Cryptanalysis
decrypting process without knowing the cipher or key used to encrypt it
44
New cards
Public-key cryptography
each user has two related keys (private and public)
45
New cards
Digital signatures
data that is appended to message that's made from message and the sender's private key to ensure message authenticity
46
New cards
Digital certificate
representation of sender's authenticated public key used to minimize malicious forgeries
47
New cards
Security policy
written statement describing constraints or behavior an organization embraces regarding information provided by its users
48
New cards
Global Positioning System (GPS)
system that uses satellites to pinpoint location of any GPS receiver
49
New cards
Encrypted information vs decrypted information
Encrypted information cannot be read
Decrypted information can be read
50
New cards
Wiki
website that can be created and edited by multiple users
51
New cards
WikiLeaks
organization that publishes secret and classified documents on Web and hides information sources from government
52
New cards
Password
string of characters only you should know as the user of a particular account
53
New cards
Why does the touch ID system have issues recognizing users?
if the scanner is not clean or if the initial fingerprint scan was not done carefully
54
New cards
Online gambling issues
potential for fraud, reduction in state tax revenues
55
New cards
False rejection
rejecting an authorized individual
56
New cards
False acceptance
accepting an unauthorized individual
57
New cards
Buffer underflow
when a buffer is used to communicate between two devices/processes but it's fed with data at a lower speed than the data is being read from it
58
New cards
Biometrics vs PIN
1) authentication credentials that are related to what a person is physiologically
2) authentication credentials that is based on something that the user knows
Explore top notes
Structure of the respiratory system
Updated 920d ago
Note
Preview
World History Spring
Updated 723d ago
Note
Preview
chapter 10.3
Updated 1087d ago
Note
Preview
Chapter 5: Nucleic Acid Extraction
Updated 825d ago
Note
Preview
Exploring Data [The Practice of Statistics- Chapter 1]
Updated 1059d ago
Note
Preview
Untitled
Updated 962d ago
Note
Preview
Leading to the Civil War
Updated 894d ago
Note
Preview
Periodic Table
Updated 1006d ago
Note
Preview
Explore top flashcards
wordlist biology year 8
Updated 162d ago
Flashcards (62)
Preview
LEC 8.1: Asepsis & Infection Prevention
Updated 54d ago
Flashcards (79)
Preview
Knowledge Check 3.1, 3.2 and 3.3 Study Guide
Updated 229d ago
Flashcards (32)
Preview
Biomed I: Ethics and Safety
Updated 924d ago
Flashcards (44)
Preview
ch 1 ap gov vocab
Updated 492d ago
Flashcards (22)
Preview
Latin 1: Midterm Review Vocabulary
Updated 877d ago
Flashcards (31)
Preview
Español 3: Unidad 3 - Todo el Vocabulario
Updated 59d ago
Flashcards (48)
Preview
EXP 14: Bile
Updated 21d ago
Flashcards (40)
Preview