Unit 10 - Cybersecurity And Global Impacts Flashcards

1
Q

Computing Innovation

A

Includes a program as an integral part of its function. Can be physical (self driving car), non-physical computing software (picture editing software), or non-physical computing concepts (e-commerce)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Personally Identifiable Information (PII)

A

Information about an individual that identifies, links, relates, or describes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing

A

A technique that attempts to trick a user into providing personal information. Scamming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Keylogging

A

The use of a program to record every keystroke make by a computer user in order to gain fraudulent access to passwords and other confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malware

A

Software intended to damage a computing system or to take partial control over its operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rouge Access Point

A

A wireless access point that gives unauthorized access to secure networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption

A

A process of encoding messages to keep them secret, so only “authorized” parties can read it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Decryption

A

A process that reverses encryption, taking a secret message and reproducing the original in plain test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Symmetric Key Encryption

A

Involves one key for both encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Public Key Encryption

A

Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Multi-factor authentification

A

A system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly