Communications and Networks Part 2 Flashcards
A ________ is designed to protect a computer or network from intruders.
firewall
[Explanation]
A firewall can be hardware or software-based or a combination of the two.
A _____ is a program that reproduces itself, either by making copies of itself or by attaching to another program.
virus
[Explanation]
Many common viruses attach themselves to an existing executable program, and when that program is copied to and run on other computers, the virus infects those computers.
A ____________ is a program that is disguised as an innocent program to gain control of your computer.
Trojan horse
[Explanation]
Trojan horses refer to programs that appear to serve a normal function–i.e. two common examples are games and screensavers–but have a hidden, malicious agenda. For example, a game or a screensaver that’s a Trojan horse will contain code designed to give a hacker access to your computer. Trojan horses can also carry viruses and destructive instructions.
__________ uses mathematical formulas to create coded messages.
Encryption
To prevent unauthorized access to sensitive data, you encrypt data when you send it and this data is decrypted by its authorized recipient using an encryption ____.
key.
___________ cable transmits pulsating beams of light rather than electricity.
Fiber optic
[Explanation]
Fiber optic cable consists of dozens or hundreds of thin strands of glass or plastic; it is more secure and can carry much more data than normal copper telephone wire.
Infrared transmission sends data via light waves at a frequency too ___ for human eyes to see.
low
[Explanation]
Infrared ports can be found on some notebook computers, PDAs, mice and printers. Transmission is limited to short range.
A message that has not been ________ is called plaintext.
encrypted
[Explanation]
Plaintext is also called cleartext.
A message which has been encrypted is called __________.
cyphertext
The process of converting cyphertext to plaintext is ________.
decryption
Messages are encrypted using a cryptographic ________ and a key.
algorithm
[Explanation]
A cryptographic key is a number, word, or phrase that must be used to decrypt a message.
An algorithm is a _______ or set of steps for solving a particular problem.
formula
[Explanation]
To be an algorithm, a set of rules must be unambiguous and have a clear stopping point.
__________ encryption uses two keys.
Public key
[Explanation]
A public key is used to encrypt the message and a private key is used to decrypt it.
Public key encryption is used to transmit credit card data in secure e-commerce transactions and it is also used for secure email.
The public key encryption software used to encrypt documents such as email is called ___.
PGP
[Explanation]
PGP (Pretty Good Privacy) encryption software is available for free download on the web.
What does PGP stand for?
Pretty Good Privacy