9: Network and Internet Security Flashcards
any illegal act involving a computer
computer crime
gaining access to a computer, mobile device, network, file, or other resource without permission
unauthorized access
using a computing resource for unapproved activities
unauthorized use
using a computer to break into another computer system
hacking
driving around an area with a Wi-Fi-enabled computer or mobile device to find a Wi-Fi network to access and use without authorization
war driving
accessing an unsecured Wi-Fi network from your current location without authorization
Wi-Fi piggybacking
an access control system that uses information only the individual should know to identify that individual
possessed knowledge access system
a secret combination of characters used to gain access to a computer, computer network, or other resource
password
using two different methods to authenticate a user
two-factor authentication
an access control system that uses a physical object an individual has in his or her possession to identify that individual
possessed object access system
an access control system that uses one unique physical characteristic of an individual (such as a fingerprint, a face, veins, or a voice) to authenticate that individual
biometric access system
a collection of hardware and/or software intended to protect a computer or computer network from unauthorized access
firewall
a method of scrambling the contents of an e-mail message or a file to make it unreadable if an unauthorized user intercepts it
encryption
a Web page that uses encryption to protect information transmitted via that Web page
secure Web page
a type of encryption that uses a single key to encrypt and decrypt the file or message
private key encryption
a type of encryption that uses key pairs to encrypt and decrypt the file or message
public key encryption