unit 8 cybersecurity Flashcards

1
Q

What is a computing innovation?

A

an innovation that includes a program as an integral part of its function. Can be physical, non-physical computing software, or non-physical computing concepts (e.g. e-commerce and e-currency)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is PII?

A

personally identifiable information: information about an individual that identifies, links, relates, or describes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is phishing?

A

a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is keylogging?

A

The use of a program to record every keystroke made by a computer user to gain fraudulent access to passwords and other confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is malware?

A

Software intended to damage a computing system or to take partial control over its operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a rogue access point?

A

a wireless access point that gives unauthorized access to secure networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is encryption?

A

a process of encoding messages to keep them secret, so only “authorized” parties can read it
-done using an encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is decryption?

A

a process that reverses encryption, taking a secret message and reproducing the original method

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is symmetric key encryption and when is it used?

A

involves one key for both encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an encryption algorithm?

A

some method of doing encryption
Caesar Cipher—is an encryption algorithm that involves shifting the alphabet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is an encryption key?

A

specific input that dictates how to apply the method and can also be used to decrypt the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is the caesar cipher, what is its encryption key, and how do you decrypt it

A

the caesar cipher is an encryption algorithm that involves shifting the alphabet a set number of letters. the key is how many letter it is each digit is shifted
you decrypt it by shifting the letters of the message back to the original.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a cipher the same as?

A

an encryption algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is cracking a message and how is it different than decrypting?

A

using various methods to try to figure out a secret message
this is different from decryption because it DOES NOT REQUIRE A KEY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is public key encryption and what is it the same as? Why is it used on the internet?

A
  • IT IS THE SAME AS ASYMMETRIC ENCRYPTIONpairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message.
    -this is used on the internet because the many two computing devices communicating will never have to agree on one key, making secure communication more widespread,safer, and efficent.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is freeware?

A

untrustworthy (often free) downloads from freeware or shareware sites that can contain malware

17
Q

what is keylogging?

A

the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

18
Q

what is multi-factor authentication and why is it important?

A

a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
- these new steps exponentially increase the number of attempts needed to accesses protected information

19
Q

what are the characteristics of a strong password?

A

easy for a user to remember but difficult for someone else to guess based on knowledge of that user