unit 8 cybersecurity Flashcards
What is a computing innovation?
an innovation that includes a program as an integral part of its function. Can be physical, non-physical computing software, or non-physical computing concepts (e.g. e-commerce and e-currency)
What is PII?
personally identifiable information: information about an individual that identifies, links, relates, or describes them
What is phishing?
a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails.
What is keylogging?
The use of a program to record every keystroke made by a computer user to gain fraudulent access to passwords and other confidential information
What is malware?
Software intended to damage a computing system or to take partial control over its operation
What is a rogue access point?
a wireless access point that gives unauthorized access to secure networks
What is encryption?
a process of encoding messages to keep them secret, so only “authorized” parties can read it
-done using an encryption algorithm
What is decryption?
a process that reverses encryption, taking a secret message and reproducing the original method
what is symmetric key encryption and when is it used?
involves one key for both encryption and decryption
What is an encryption algorithm?
some method of doing encryption
Caesar Cipher—is an encryption algorithm that involves shifting the alphabet.
what is an encryption key?
specific input that dictates how to apply the method and can also be used to decrypt the message.
what is the caesar cipher, what is its encryption key, and how do you decrypt it
the caesar cipher is an encryption algorithm that involves shifting the alphabet a set number of letters. the key is how many letter it is each digit is shifted
you decrypt it by shifting the letters of the message back to the original.
What is a cipher the same as?
an encryption algorithm
what is cracking a message and how is it different than decrypting?
using various methods to try to figure out a secret message
this is different from decryption because it DOES NOT REQUIRE A KEY
What is public key encryption and what is it the same as? Why is it used on the internet?
- IT IS THE SAME AS ASYMMETRIC ENCRYPTIONpairs a public key for encryption and a private key for decryption. The sender does not need the receiver’s private key to encrypt a message, but the receiver’s private key is required to decrypt the message.
-this is used on the internet because the many two computing devices communicating will never have to agree on one key, making secure communication more widespread,safer, and efficent.
what is freeware?
untrustworthy (often free) downloads from freeware or shareware sites that can contain malware
what is keylogging?
the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
what is multi-factor authentication and why is it important?
a system that requires at least two steps to unlock protected information; each step adds a new layer of security that must be broken to gain unauthorized access
- these new steps exponentially increase the number of attempts needed to accesses protected information
what are the characteristics of a strong password?
easy for a user to remember but difficult for someone else to guess based on knowledge of that user