Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
23 Cards in this Set
- Front
- Back
hardwre theft
|
The act of stealing computer equipment.
|
|
hardware vandalism
|
The act of defacing or destroying computer equipment.
|
|
software theft
|
Computer security risk that occurs when someone (1) steals software media, (2) intentionally erases programs, (3) illegally copies a program, or (4) illegally registers and/or activates a program.
|
|
license aggreement
|
An agreement issued by a software manufacturer that gives the user the right to use the software.
|
|
information theft
|
Computer security risk that occurs when someone steals personal or confidential information.
|
|
encryption
|
Process of converting readable data into unreadable characters to prevent unauthorized access.
|
|
decrypt
|
Process of deciphering encrypted data into a readable form.
|
|
encryptian algorithm
|
Set of steps that can convert readable plaintext into unreadable ciphertext.
|
|
encrytion key
|
Set of characters that the originator of the encrypted data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
|
|
plaintext
|
nencrypted, readable data.
|
|
ciphertext
|
encrypted unreadable data
|
|
digital structure
|
Encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender.
|
|
digital certificate
|
A notice that guarantees a user or a Web site is legitimate.
|
|
certificate authority
|
Authorized person or company that issues and verifies digital certificates.
|
|
system failure
|
Prolonged malfunction of a computer.
|
|
surge protector
|
Device that uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment.
|
|
UPS
|
Device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.
See page575 |
|
backup
|
Duplicate or copy of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
|
|
restore
|
To copy backed up files by copying them to their original location on the computer.
|
|
WAP
|
wireless access port
|
|
war driving
|
Intrusion technique in which an individual attempts to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network.
|
|
WPA
|
Security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques.
|
|
802.11i
|
Network standard that conforms to government's security standards and uses more sophisticated encryption techniques than WPA. Sometimes called WPA2.
|