Unit 8 Vocab Flashcards
(15 cards)
Computing Innovation
Includes a program as an integral part of its function. Can be physical (e.g. self-driving car), or non-physical computing software (e.g. picture editing software), or non-physical computing concepts (e.g. e-commerce).
Personally Identifiable Information (PII)
Information about an individual that identifies, links, relates, or describes them.
Phishing
A technique that attempts to trick a user into providing personal information.
Keylogging
The use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information.
Malware
Software intended to damage a computing system or to take partial control over its operation.
Rogue Access Point
A wireless access point that gives unauthorized access to secure networks.
Encryption
A process of encoding messages to keep them secret, so only ‘authorized’ parties can read it.
Decryption
A process that reverses encryption, taking a secret message and reproducing the original plain text.
Symmetric Key Encryption
Involves one key for both encryption and decryption.
Public Key Encryption
Pairs a public key for encryption and a private key for decryption.
Multi-factor Authentication
A system that requires at least two steps to unlock protected information.
Cipher
A generic term for a technique (or algorithm) that performs encryption.
Caesar’s Cipher
A technique for encryption that shifts the alphabet by some number of characters.
Cracking Encryption
When you attempt to decode a secret message without knowing all the specifics of the cipher.
Computer Virus Scanning Software
Protects a computing system against infection.