Unit 10: Cybersecurity and Global Impacts Flashcards
computing innovation
include program as integral part of function; physical, non-physical software, non-physical computing concept
PII
personally identifiable information; about individual that identifies, links, relates, or describes them
phishing
technique attempt to trick user into providing personal information for access to access sensitive online resources
keylogging
use of program to record every single keystroke made by computer user to gain fraudulent access to sensitive information
malware
software intended to dmg computing system or take partial control over operation
rogue access point
wireless access point that gives unauthorized access to secure networks
encryption
process of encoding msgs to keep them secret, only authorized parties can view
decryption
process reverse encryption, take secret msg and reproduce original plain text
symmetric key encryption
involve one key for both encryption and decryption
public key encryption
pair public key (encryption) and private key (decryption), recipient private key required to decrypt msg
MFA
multi-factor authentication; system that require at least two steps to unlock protected information
physical computing innovation ex
self-driving car
non-physical computing software innovation ex
picture editing software
non-physical computing concept innovation example
e-commerce