Unit 10 - Cybersecurity And Global Impacts Flashcards
Computing Innovation
Includes a program as an integral part of its function. Can be physical (self driving car), non-physical computing software (picture editing software), or non-physical computing concepts (e-commerce)
Personally Identifiable Information (PII)
Information about an individual that identifies, links, relates, or describes them
Phishing
A technique that attempts to trick a user into providing personal information. Scamming.
Keylogging
The use of a program to record every keystroke make by a computer user in order to gain fraudulent access to passwords and other confidential information
Malware
Software intended to damage a computing system or to take partial control over its operation
Rouge Access Point
A wireless access point that gives unauthorized access to secure networks
Encryption
A process of encoding messages to keep them secret, so only “authorized” parties can read it
Decryption
A process that reverses encryption, taking a secret message and reproducing the original in plain test
Symmetric Key Encryption
Involves one key for both encryption and decryption
Public Key Encryption
Pairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message
Multi-factor authentification
A system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access.