Computer Science -- Lecture 8

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

Antivirus software

Software installed to detect and remove malicious code. Signature detection known malware, and identify general patterns

2
New cards

Information security

The techniques and policies used to ensure proper access to data

3
New cards

Confidentiality

Ensuring that data is protected from unauthorized access

4
New cards

Availability

The degree to which authorized users can access information for legitimate purposes

5
New cards

Integrity

Ensuring that data can be modified only by appropriate mechanisms

6
New cards

CIA Triad

Confidentiality, Integrity, Availability

7
New cards

Risk Analysis

Determining/Planning the nature and likelihood of the risks to key data. Minimizing vulnerability

8
New cards

User authentication

The process of vertifying the credentials of a particular user of a computer or software system

9
New cards

Authentication credentials

Information users provide to identify themselves for computer access

10
New cards

Smart card

A card with an embedded memory chip used to identify users and control access

11
New cards

Biometrics

Using physiological characteristics, such as fingerprints, to identify users and control access

12
New cards

Password criteria

A set of rules that must be followed when creating a password

13
New cards

Password management software

A program that helps you manage sensitive data, such as passwords, in a secure manner

14
New cards

CAPTCHA

Software that verifies that the user is not another computer

15
New cards

Trojan horse

Disguised as benevolent resource; stand alone file; affects single computers

16
New cards

Logic bomb

set up to execute at system event

17
New cards

Password guessing

An attempt to gain access to a computer system by methodically trying to determine a user's password.

18
New cards

Phishing

Using a web page to masquerade as part of a trusted system to trick users into revealing security information

19
New cards

Spoofing

An attack on a computer system in which a malicious user masquerades as an authorized user.

20
New cards

Back door

A program feature that gives special and unauthorized access to a software system to anyone who knows it exist

21
New cards

Buffer overflow

A defect an a computer program that could cause a system to crash and leave the user with heightened privileges

22
New cards

Denial-of-service

Attack that prevents authorized users from accessing the system

23
New cards

Man-in-the-middle

A security attack in which network communication is intercepted in an attempt to obtain key data

24
New cards

Cryptography

The field of study related to encoded information

25
New cards

Encryption

The process of converting plaintext into ciphertext

26
New cards

Decryption

The process of converting ciphertext into plaintext

27
New cards

Cipher

An algorithm used to encrypt and decrypt text

28
New cards

Substitution cipher

A cipher that substitutes one character with another

29
New cards

Caesar cipher

A substitution cipher that shifts characters a certain number of positions in the alphabet

30
New cards

Transposition cipher

A cipher that rearranges the order of existing characters in a message

31
New cards

Route cipher

A transposition cipher that lays out a message in a grid and traverses it in a particular way

32
New cards

Cryptanalysis

The process of decrypting a message without knowing the cipher or the key used to encrypt it

33
New cards

Public-key cryptography

An approach to cryptography in which each user has two related keys, one public and one private

34
New cards

Digital signature

Data that is appended to a message, made from the message itself and the sender's private key, to ensure the authenticity of the message

35
New cards

Digital certificate

A representation of a sender's authenticated public key used to minimize malicious forgeries

36
New cards

Security policy

A written document describing the constraints or behavior an organization embraces regarding the information provided by its users

37
New cards

GPS (Global Positioning System)

A system that uses satellites to pinpoint the location of any GPS reciever

38
New cards

Wiki

A website whose content can be created and edited by multiple users

39
New cards

Fingerprint analysis

A technique used for user authentication that compares a scanned fingerprint to a stored copy of the authorized user's fingerprint

40
New cards

Malicious code (malware)

A computer program that attempts to bypass appropriate authorization safeguards and/or performs unauthorized functions

41
New cards

Virus

Embeds a copy of itself in a host file; it is self-replicating; destroys files; affects single computers

42
New cards

Worm

Self replicating but does not need a host file; stands alone, targets network resources; uses up bandwidth

43
New cards

reCAPTCHA

Software that helps digitize books at the same time

44
New cards

Social Engineering

trick people into revealing access credentials or other valuable information

45
New cards

Key

The set of parameters that guide a cipher. Neither is any good without the other