Quizlet: Safe Computing Vocab

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/35

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

36 Terms

1
New cards

Personally Identifiable Information (PII)

information about an individual that identifies, links, relates, or describes them. (address, bank info, mother's maiden name)

2
New cards

Symmetric Key Encryption

involves one key for both encryption and decryption. Because one key is used, and is sent back and forth, when you send the key you are simultaneously encrypting the key itself.

3
New cards

Phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information (text, call, email)

4
New cards

Trojan Horse

a program that appears desirable but actually contains something harmful, such as malware, or a virus.

5
New cards

Spyware

A type of Malware that locates and saves data from users without them knowing about it, sells data to advertisments.

6
New cards

Virus Protection

Preventing a computer virus from infecting a computer by using special software and common sense.

7
New cards

Malicious Link

A link on a page or website that may appear desirable or safe, but contains malware that may harm the user.

8
New cards

Dictionary Attack

A password attack that creates encrypted versions of common dictionary words and compares them against those in a stolen password file.

9
New cards

Fingerprint Recognition

A type of security ant authorization by using the user's fingerprint to confirm who is attempting to access hardware or a program.

10
New cards

Multi-factor authentication

Having multiple layers to protect and secure a program, or something that is secure (at least 2 ways)

11
New cards

Asymmetric Key Encryption

Encryption that uses two keys, public and private, to protect and encrypt that data.

12
New cards

Keylogging

Use of a program that record every keystroke, can be used to access unauthorized information from the user.

13
New cards

Worm

A destructive computer program that can spread out across a network rapidly, replicating itself.

14
New cards

Spam

Unwanted e-mail or messages that are normally sent in bulk not directed towards specific users.

15
New cards

Decryption

Process of reversing encryption, going through protected data and unraveling whatever is being hidden.

16
New cards

Unsolicited Emails

Unwanted e-mails that are normally sent in mass amounts (like spam) and are received by random users.

17
New cards

Freeware
(Malicious links/downloads)

Software that is accessible with little to no cost at all, can hide possible malicious links or downloads if the user isn't aware.

18
New cards

Iris Scan Recognition

Biometric technology that identifies individuals by analyzing and saving images of their eyes.

19
New cards

Password

A word or phrase that a user can create to encrypt their personal information. (number, letters, symbols)

20
New cards

Computer Virus

An unwanted software program that has the capability of attacking the network to which it is given access.

21
New cards

Malware

Malicious software that is intended to damage or disable computers and computer systems. (Virus, phishing, adware, trojan horse)

22
New cards

Biometric Authentication

Uses personal physical characteristics such as fingerprints, facial features, and retinal scans to authenticate users.

23
New cards

Adware

A program that displays advertisements for a specific site or page for revenue, unwanted, possibly malicious.

24
New cards

Ransomware

a type of malicious software designed to block access to a computer system until a sum of money is paid.

25
New cards

Hacking

invading someone else's computer, usually for personal gain or just for the satisfaction of invading someone else's computer

26
New cards

Encryption

Process of converting readable data into unreadable characters to prevent unauthorized access.

27
New cards

DDOS Attack

Distributed Denial of Service Attack. Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed.

28
New cards

Rogue Access Points

Unauthorized wireless network access device.

29
New cards

Geolocation

The identification of the location of a person or object using technology.

30
New cards

Cookies

a computer program, installed on hard drives, that provides identifying information from a website or page accessed.

31
New cards

CIA Triad

Confidentiality (limiting access to info to those who are authorized) Integrity (making sure information is correct) Availability (ensuring people who are authorized can access)

32
New cards

Brute Force Attack

An attack on passwords or encryption that tries every possible password or encryption key. Bots are normally used for thousands of attempts per hour.

33
New cards

Shareware
(Malicious links/downloads)

Software that is accessible with a trial normally before paying, can be used to trick unknowing users to install or pay for unwanted malware.

34
New cards

Facial Recognition

A biometric technology that looks for unique measurements in an individual's face.

35
New cards

TLS/SSL *

One was the predecessor to the other: Both were used to encrypt information and data on the internet that is sent throughout the web/

36
New cards

Digital Certificate *

Limited use Certificate given that guarantees a website is available to use