Unit 11 - Privacy and Security Vocabulary

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

flashcard set

Earn XP

Description and Tags

Flashcards covering key vocabulary related to privacy and security in computing.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

Computing Innovation

Includes a program as an integral part of its function, which can be physical, non-physical computing software, or non-physical computing concepts.

2
New cards

Personally Identifiable Information (PII)

Information about an individual that identifies, links, relates, or describes them.

3
New cards

Cookies

A piece of data contained in a small text file stored on your computer to collect data from your browser, such as preferences, location data, and browsing data.

4
New cards

Phishing

A technique that attempts to trick a user into providing personal information for accessing sensitive online resources.

5
New cards

Keylogging

The use of a program to record every keystroke made by a computer user to gain access to passwords and other confidential information.

6
New cards

Malware

Software intended to damage a computing system or to take partial control over its operation.

7
New cards

Rogue Access Point

A wireless access point that gives unauthorized access to secure networks.

8
New cards

Computer Virus

A malicious program that can copy itself and gain unauthorized access to a computer.

9
New cards

Cipher

A generic term for a technique (or algorithm) that performs encryption.

10
New cards

Caesar Cipher

A technique for encryption that shifts the alphabet by a certain number of characters.

11
New cards

Encryption

A process of encoding messages to keep them secret, so only authorized parties can read them.

12
New cards

Decryption

The process that reverses encryption, reproducing the original plain text from a secret message.

13
New cards

Symmetric Key Encryption

Involves one key for both encryption and decryption.

14
New cards

Public/Asymmetric Key Encryption

Uses a public key for encryption and a private key for decryption.

15
New cards

Digital Certificate

Validates the owner of encryption keys used in secure communications.

16
New cards

Certificate Authority

Issues digital certificates that validate the owner of encryption keys based on a trust model.

17
New cards

Multi-factor Authentication

A system that requires at least two steps to unlock protected information, enhancing security.

18
New cards

Computer Virus Scanning Software

Protects a computing system against infection.