Unit 10 - Cybersecurity and Global Impacts

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 10

11 Terms

1

Computing Innovation

includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).

New cards
2

Personally Identifiable Information (PII)

information about an individual that identifies, links, relates, or describes them.

New cards
3

Phishing

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails

New cards
4

Keylogging

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

New cards
5

Malware

software intended to damage a computing system or to take partial control over its operation

New cards
6

Rogue Access Point

a wireless access point that gives unauthorized access to secure networks.

New cards
7

Encryption

a process of encoding messages to keep them secret, so only "authorized" parties can read it.

New cards
8

Decryption

a process that reverses encryption, taking a secret message and reproducing the original plain text.

New cards
9

Symmetric Key Encryption

involves one key for both encryption and decryption.

New cards
10

Public Key Encryption

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message

New cards
11

Multi-factor Authentication

a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access

New cards

Explore top notes

note Note
studied byStudied by 29 people
854 days ago
5.0(2)
note Note
studied byStudied by 11 people
979 days ago
5.0(1)
note Note
studied byStudied by 5 people
42 days ago
5.0(1)
note Note
studied byStudied by 5 people
826 days ago
5.0(1)
note Note
studied byStudied by 7 people
685 days ago
5.0(1)
note Note
studied byStudied by 1 person
48 days ago
5.0(1)
note Note
studied byStudied by 7 people
46 days ago
5.0(2)
note Note
studied byStudied by 59 people
831 days ago
5.0(2)

Explore top flashcards

flashcards Flashcard (104)
studied byStudied by 42 people
327 days ago
5.0(1)
flashcards Flashcard (67)
studied byStudied by 7 people
127 days ago
5.0(1)
flashcards Flashcard (45)
studied byStudied by 3 people
683 days ago
5.0(1)
flashcards Flashcard (92)
studied byStudied by 1 person
667 days ago
5.0(1)
flashcards Flashcard (120)
studied byStudied by 3 people
273 days ago
5.0(1)
flashcards Flashcard (95)
studied byStudied by 7 people
685 days ago
5.0(1)
flashcards Flashcard (46)
studied byStudied by 24 people
783 days ago
5.0(3)
flashcards Flashcard (54)
studied byStudied by 13 people
701 days ago
5.0(2)
robot