Protecting Your Device and Network Flashcards
Module 3 (8 cards)
KRACK
key reinstallation attacks
NIST
United States National Institute of Standards and Technology
the process of converting information into a form in which unauthorized parties cannot read it
Encryption
EFS
Encrypting File System
A legally binding contract that governs the rules of the relationship between you, the service provider and others who use the service
Terms of Service
You own your content but the photo sharing company can re-use any of your content for any purposes
The Data Use Policy
OAuth
Open Authorization
an open standard protocol that allows you to use your credentials to access third-party applications without exposing your password.
Open authorization (OAuth)