Finals Deck Flashcards
(43 cards)
Encryption
renders message unreadable to everyone except intended recipient
Decryption
Revealing original meaning of encrypted message
Symmetric Key Encryption
Same key is used to encrypt and decrypt message
Computationally Secure
takes too long for a hacker to crack code
Hash Function
maps input of any size into output of fixed size
Certificate Authority
verifies digital signature of a trusted org.
Tapping
Eavesdropping on telephone lines
Sniffing
Eavesdropping on computer network
Radiation
wires give off electric signal that can be intercepted
Web Scraping
when computer program searches the web for info
Malware
malicious software designed to cause damage or loss of control to a computer
Computer Virus
Subset of Malware
software that attaches to other programs in order to be executed
Worm
Subset of Malware
similar to virus but runs on its own
Trojan Horse
Subset of Malware
software that appears to be benign, but actually runs malicious software in the background
Phishing
Subset of Malware
email or text that tricks user into giving sensitive information
Denial of Service Attack
Subset of Malware
overwhelm website by overloading with traffic
Spam
Subset of Malware
Junk email
Ransomware
Subset of Malware
software that threatens to publish files and/or prevents use of computer until ransom is paid
Computer Security
Policies, Procedures, and Technical Measures, to ensure unauthorized access, theft, interruption or physical damage does not occur to information systems
Attack Surface
Different places where a hacker can gain data
Discovery Request
legal request for electronic documents
Acceptable Use Policy
states acceptable uses and USERS of information and computers
Data
Raw Facts
Information
Data that is shaped into a meaningful form