Unit 10 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Computing Innovation

A

includes a program as an integral part of its function. Can be physical (e.g. self-driving car), non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g., e-commerce).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Personally Identifiable Information (PII):

A

information about an individual that identifies, links, relates, or describes them.
Most digital technology needs some kind of PII to work
advertise to you by creating detailed profiles of who you are and what you like
PII can be used to steal the identity of a person, or stalk them online. Information that is often posted on social media can be combined to create a profile on you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

10.3 takeaways

A

slide 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing

A

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Keylogging

A

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

oftware intended to damage a computing system or to take partial control over its operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rogue Access Point

A

a wireless access point that gives unauthorized access to secure networks. (starbucks2) (airport/traveling)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

10.4 takeaways

A

Our private data powers a lot of computing innovations in ways we like. It makes products that are convenient, interesting, personal, useful, and often “free” because we “pay” with our data.
Not every effect of a computing innovation is anticipated in advance.
This data can also be used by companies, governments, or criminals in ways that we didn’t intend or that threatens our privacy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encryption

A

a process of encoding messages to keep them secret, so only “authorized” parties can read it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Decryption

A

a process that reverses encryption, taking a secret message and reproducing the original plain text.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symmetric Key Encryption

A

involves one key for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Public Key Encryption

A

pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multifactor Authentication

A

a method of computer access in which a user has to successfully provide evidence in at least two of the following categories: knowledge (something they know), possession (something they have), and inherence (something they are). Each step provides a new layer of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Computer Virus Scanning Software

A

protects a computing system against infection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cipher

A

the generic term for a technique (or algorithm) that performs encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Caesar’s Cipher:

A

a technique for encryption that shifts the alphabet by some number of characters.

17
Q

Cracking encryption

A

When you attempt to decode a secret message without knowing all the specifics of the cipher, you are trying to crack the encryption.

18
Q

asymmetric key encryption

A

allows users to encrypt information using shared keys

19
Q

Distributed Denial of Service (DDos)

A

a cybercrime in which the attacker floods a server with internet traffic to prevent users from accessing connected online services and sites

20
Q

digital certificate

A

an electronic document used to prove the validity of a public key

21
Q

random substitution cipher

A

an encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet.

22
Q

big data

A

data that contains greater variety, arriving in increasing volumes and with more velocity

23
Q

digital divide

A

the gap between demographics and regions that have access to modern information and communications technology (ICT), and those that don’t or have restricted access

24
Q

heuristic

A

when it’s impractical to solve a particular problem with a step-by-step algorithm

25
Q

botnet

A

a network of computers infected by malware that are under the control of a single attacking party, known as the “bot-herder