Computer Science -- Lecture 8

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/41

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

42 Terms

1
New cards

Antivirus software

Software designed to detect, remove, and/or prevent malicious software

2
New cards

Information security

The techniques and policies used to ensure proper access to data

3
New cards

Confidentiality

Ensuring that data is protected from unauthorized access

4
New cards

Availability

The degree to which authorized users can access information for legitimate purposes

5
New cards

Integrity

Ensuring that data can be modified only by appropriate mechanisms

6
New cards

Risk Analysis

Determining the nature and likelihood of the risks to key data

7
New cards

User authentication

The process of vertifying the credentials of a particular user of a computer or software system

8
New cards

Authentication credentials

Information users provide to identify themselves for computer access

9
New cards

Smart card

A card with an embedded memory chip used to identify users and control access

10
New cards

Biometrics

Using physiological characteristics, such as fingerprints, to identify users and control access

11
New cards

Password criteria

A set of rules that must be followed when creating a password

12
New cards

Password management software

A program that helps you manage sensitive data, such as passwords, in a secure manner

13
New cards

CAPTCHA

A software mechanism used to verify that a web form is submitted by a human and not an automated prgram

14
New cards

Trojan horse

A malicious program disguised as a benevolent resource

15
New cards

Logic bomb

A malicious program that is set up to execute when a specific system event occurs

16
New cards

Password guessing

An attempt to gain access to a computer system by methodically trying to determine a user's password.

17
New cards

Phishing

Using a web page to masquerade as part of a trusted system to trick users into revealing security information

18
New cards

Spoofing

An attack on a computer system in which a malicious user masquerades as an authorized user.

19
New cards

Back door

A program feature that gives special and unauthorized access to a software system to anyone who knows it exist

20
New cards

Buffer overflow

A defect an a computer program that could cause a system to crash and leave the user with heightened privileges

21
New cards

Denial-of-service

An attack on a network resource that prevents authorized users from accessing the system

22
New cards

Man-in-the-middle

A security attack in which network communication is intercepted in an attempt to obtain key data

23
New cards

Cryptography

The field of study related to encoded information

24
New cards

Encryption

The process of converting plaintext into ciphertext

25
New cards

Decryption

The process of converting ciphertext into plaintext

26
New cards

Cipher

An algorithm used to encrypt and decrypt text

27
New cards

Substitution cipher

A cipher that substitutes one character with another

28
New cards

Caesar cipher

A substitution cipher that shifts characters a certain number of positions in the alphabet

29
New cards

Transposition cipher

A cipher that rearranges the order of existing characters in a message

30
New cards

Route cipher

A transposition cipher that lays out a message in a grid and traverses it in a particular way

31
New cards

Cryptanalysis

The process of decrypting a message without knowing the cipher or the key used to encrypt it

32
New cards

Public-key cryptography

An approach to cryptography in which each user has two related keys, one public and one private

33
New cards

Digital signature

Data that is appended to a message, made from the message itself and the sender's private key, to ensure the authenticity of the message

34
New cards

Digital certificate

A representation of a sender's authenticated public key used to minimize malicious forgeries

35
New cards

Security policy

A written document describing the constraints or behavior an organization embraces regarding the information provided by its users

36
New cards

GPS (Global Positioning System)

A system that uses satellites to pinpoint the location of any GPS reciever

37
New cards

Wiki

A website whose content can be created and edited by multiple users

38
New cards

Fingerprint analysis

A technique used for user authentication that compares a scanned fingerprint to a stored copy of the authorized user's fingerprint

39
New cards

Malicious code (malware)

A computer program that attempts to bypass appropriate authorization safeguards and/or performs unauthorized functions

40
New cards

Virus

A malicious, self-replicating program that embeds itself into other code

41
New cards

Worm

A malicious stand-alone program that often targets network resources

42
New cards

Heuristics

Strategies used to identify general patterns