Unit 8 Security Risks Flashcards

1
Q

Legal and Ethical Concerns are raised by

A

Computing Innovations that harm people and computing innovations that play a role in social and political issues

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computationally hard

A

It will take an unreasonable amount of time to compute- only way to crack is to run for a very long time trying all permutations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Personally Identifiable Information

A

Information about an individual that identifies, links, relates, or describes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing

A

Tricks user into providing personal information. Can be used to access sensitive online resources, such as bank accounts and emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Keylogging

A

The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

Software intended to damage a computing system or take partial control over it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rogue Access Point

A

Wireless access point that gives unauthorized access to secure networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption

A

Process of encoding messages to keep them secret, so only “authorzized” users can read it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Decryption

A

Reverses encryption, taking secret message and making it into PLAIN TEXT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Symmetric Key Encrytpion

A

Uses the same key for Encrypting and Decrypting( Caesar cipher)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Public Key Encryption

A

Asymmetric uses diff keys for decrypting and encrypting. Receivers private key is required to decrypt the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multi Factor Authentification

A

Method of computer access in which a user has to successfully provide evidence in at least of two of the following categories: knowledge, possession, and inference( something they are)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Computer Virus Scanning Software

A

Protects a computing system against infection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cookies

A

Text files with a small pieces of data that are used to identify your computer as you use a network. Specific cookies are used to identify specific users and improve their web browsing experience. Data is labeled with an ID unique to you and your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A certificate authority(CA)

A

Trusted entity that issues Secure Sockets Layer SSL certificates. These digital certificates are data files used to link an entity with a public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Geolocations

A

The use of location technologies such as GPS or IP addresses to identify and track the whereabouts of connected electronic devices