Lesson 8 Flashcards

1
Q

Anti-Virus Software

A

Software that scans disk and programs for known viruses and and eliminates them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Asymmetric Encryption

A

An encryption technique in which two keys (a private key and a public key) are used: one to encrypt and decrypt a message. Also know as public key cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication

A

The process of identifying the identity of a user who logs on to a system, or the integrity of transmitted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Decryption

A

The process of converting encrypted data back to its original form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Digital Certificate

A

A password-protected, encrypted data file containing message encryption, user identification and message text. Used to authentication a program or a sender’s public key, or to initiate SSL sessions, Must be signed by a certificate authority (CA) to be valid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Digital Signature

A

An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time of the signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption

A

A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firewall

A

A security barrier that controls the flow of information between the Internet and a private network. It prevents outsiders from accessing an enterprise’s internal network, which accesses the Internet indirectly through a proxy server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hash

A

A number generated by an algorithm from a text string. Also, known as a message digest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hash Encryption

A

An encryption method in which hashes are used to verify the integrity of transmitted messages. Also known as one-way encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Illicit server

A

An application that installs hidden services on systems. Illicit servers consist of “client” code and “server” code that enable the attacker to monitor and control the operation of the computer infected with the server code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internet Control Messaging Protocol

A

A subset of Internet Protocol that is most often used to determine whether a computer can communicate with the rest of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Key

A

A variable value, such as a numeric code,that uses an algorithm to encrypt and decrypt data. Some applications encrypt and decrypt with the same key, whereas other applications use a pair of keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malware

A

Abbreviation for malicious software. It is software designed to harm computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Non-Repudiation

A

The security principle of providing proof that a transaction occurred between identified parties. Repudiation occurs when one party in a transaction denies that the transaction took place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Patch

A

Programming code that provides a temporary solution to a known problem, or bug.

17
Q

Screen Saver

A

A graphic or moving image that appears on your screen when your computer is idle.

18
Q

Secure Sockets Layer

A

A protocol that provides authentication and encryption, used by most servers for secure exchanges over the Internet. Superseded by Transport Layer Security (TLS).

19
Q

Spyware

A

A software application secretly placed on a user’s system to gather information and relay it to outside parties, usually for advertising purposes.

20
Q

Symmetric Encryption

A

An encryption method in which the same key is used to encrypt and decrypt a message. Also known as private-key encryption.

21
Q

The Right to Be Forgotten

A

An argument that asks “Do people have the right to remove damaging information about themselves on the Internet so the information can be forgotten?”

22
Q

Transport Layer Security

A

A protocol based on SSL 3.0 that provides authentication and encryption, used by most servers for secure exchanges over the Internet.

23
Q

Trojan

A

A program disguised as a harmless application that actually produces harmful results.

24
Q

Typosquatting

A

The unethical practice of registering domain names very similar to those of high-volume sites in hopes of receiving traffic from users seeking the high volume site who mistakenly enter an incorrect URL in their browsers.

25
Q

Update

A

A file or collection of tools that resolves system liabilities and improves software performance.

26
Q

Virus

A

A malicious program that replicates itself on computer systems, usually through executable software, and causes irreparable system damage.

27
Q

Worm

A

A self-replicating program or algorithm that consumes system resources.