Unit 8 Security Risks Flashcards
Legal and Ethical Concerns are raised by
Computing Innovations that harm people and computing innovations that play a role in social and political issues
Computationally hard
It will take an unreasonable amount of time to compute- only way to crack is to run for a very long time trying all permutations
Personally Identifiable Information
Information about an individual that identifies, links, relates, or describes them
Phishing
Tricks user into providing personal information. Can be used to access sensitive online resources, such as bank accounts and emails
Keylogging
The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information
Malware
Software intended to damage a computing system or take partial control over it
Rogue Access Point
Wireless access point that gives unauthorized access to secure networks
Encryption
Process of encoding messages to keep them secret, so only “authorzized” users can read it
Decryption
Reverses encryption, taking secret message and making it into PLAIN TEXT
Symmetric Key Encrytpion
Uses the same key for Encrypting and Decrypting( Caesar cipher)
Public Key Encryption
Asymmetric uses diff keys for decrypting and encrypting. Receivers private key is required to decrypt the message
Multi Factor Authentification
Method of computer access in which a user has to successfully provide evidence in at least of two of the following categories: knowledge, possession, and inference( something they are)
Computer Virus Scanning Software
Protects a computing system against infection
Cookies
Text files with a small pieces of data that are used to identify your computer as you use a network. Specific cookies are used to identify specific users and improve their web browsing experience. Data is labeled with an ID unique to you and your computer
A certificate authority(CA)
Trusted entity that issues Secure Sockets Layer SSL certificates. These digital certificates are data files used to link an entity with a public key
Geolocations
The use of location technologies such as GPS or IP addresses to identify and track the whereabouts of connected electronic devices