1/17
Flashcards covering key vocabulary related to privacy and security in computing.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Computing Innovation
Includes a program as an integral part of its function, which can be physical, non-physical computing software, or non-physical computing concepts.
Personally Identifiable Information (PII)
Information about an individual that identifies, links, relates, or describes them.
Cookies
A piece of data contained in a small text file stored on your computer to collect data from your browser, such as preferences, location data, and browsing data.
Phishing
A technique that attempts to trick a user into providing personal information for accessing sensitive online resources.
Keylogging
The use of a program to record every keystroke made by a computer user to gain access to passwords and other confidential information.
Malware
Software intended to damage a computing system or to take partial control over its operation.
Rogue Access Point
A wireless access point that gives unauthorized access to secure networks.
Computer Virus
A malicious program that can copy itself and gain unauthorized access to a computer.
Cipher
A generic term for a technique (or algorithm) that performs encryption.
Caesar Cipher
A technique for encryption that shifts the alphabet by a certain number of characters.
Encryption
A process of encoding messages to keep them secret, so only authorized parties can read them.
Decryption
The process that reverses encryption, reproducing the original plain text from a secret message.
Symmetric Key Encryption
Involves one key for both encryption and decryption.
Public/Asymmetric Key Encryption
Uses a public key for encryption and a private key for decryption.
Digital Certificate
Validates the owner of encryption keys used in secure communications.
Certificate Authority
Issues digital certificates that validate the owner of encryption keys based on a trust model.
Multi-factor Authentication
A system that requires at least two steps to unlock protected information, enhancing security.
Computer Virus Scanning Software
Protects a computing system against infection.