IS 414 CH. 9 (VOCAB) Flashcards

1
Q

Information rights management (IRM)

A

Software that offers the capability not only to limit access to specific files or documents, but also to specify the actions (read, copy, print, download, etc.) that individuals who are granted access to that resource can perform. Some IRM software even has the capability to limit access privileges to a specific period of time and to remotely erase protected files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data loss prevention (DLP)

A

Software which works like antivirus programs in reverse, blocking outgoing messages (email, instant messages, etc.) that contain key words or phrases associated with intellectual property or other sensitive data the organization wants to protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Digital watermark

A

Code embedded in documents that enables an organization to identify confidential information that has been disclosed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data masking

A

A program that protects privacy by replacing personal information with fake values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spam

A

Unsolicited email that contains either advertising or offensive content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identity theft

A

Assuming someone’s identity, usually for economic gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cookie

A

A text file created by a website and stored on a visitor’s hard drive. Cookies store information about who the user is and hat the user has done on the site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption

A

The process of transforming normal text, called plaintext, into unreadable gibberish, called ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Plaintext

A

Normal text that has not been encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ciphertext

A

Plaintext that was transformed into unreadable gibberish using encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Decryption

A

Transforming ciphertext back into plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Symmetric encryption systems

A

Encryption systems that use the same key both to encrypt and to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Asymmetric encryption systems

A

Encryption systems that use two keys (one public, the other private); either key can encrypt, but only the other matching key can decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Public key

A

One of the keys used in asymmetric encryption systems. It is widely distributed and available to everyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Private key

A

One of the keys used in asymmetric encryption systems. It is kept secret and known only to the owner of that pair of public and private keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Key escrow

A

The process of storing a copy of an encryption key in a secure location

17
Q

Hashing

A

Transforming plaintext of any length into a short code called a hash

18
Q

Hash

A

Plaintext that has been transformed into short code

19
Q

Nonrepudiation

A

Creating legally binding agreements that cannot be unilaterally repudiated by either party

20
Q

Digital signature

A

A hash encrypted with the hash creator’s private key

21
Q

Digital certificate

A

An electronic document that certifies the identity of the owner of a particular public key and contains that party’s public key

22
Q

Certificate authority

A

An organization that issues public and private keys and records the public key in the digital certificate

23
Q

Public key infrastructure (PKI)

A

The system for issuing pairs of public and private keys and corresponding digital certificates

24
Q

Virtual private network (VPN)

A

Using encryption and authentication to securely transfer information over the internet, thereby creating a “virtual” private network