Shared Flashcard Set

Details

08 Invitation to Computer Science
Chapter 8 - Information Security
41
Computer Science
Not Applicable
03/08/2014

Additional Computer Science Flashcards

 


 

Cards

Term

A symmetric encryption algorithm that is newer than DES and uses a longer secret key
Definition
1)    Advanced Encryption Standard (AES)
Term

Software that checks for the presence of a malicious program to capture personal information that has been entered on Web pages
Definition
2)    anti-spyware
Term

Software designed to catch any possible virus attacks before they occur or to clean up the damage if they do occur
Definition
3)    anti-virus software
Term

An encryption algorithm where the encryption key is made public but the decription key, which is different, is known only to the receiver
Definition
4)    asymmetric encryption algorithm/public-key encription algorithm
Term

The process of verifying who has the right to gain access to the computer
Definition
5)    authentication
Term

Governs what an authenticated user of a computer is allowed to do
Definition
6)    authorization
Term

Any encryption algorithm that encodes a block of characters together, so that each coded character is the result of several plaintext characters
Definition
7)    block cipher
Term

A collection of infected computers under the control of a central site that can direct a DOS attack
Definition
8)    botnet
Term

An encryption algorithm that shifts each character in the message to another character some fixed distance farther along in the alphabet
Definition
9)    Caesar cipher
Term

Someone who breaks into a computer system for the purpose of doing harm
Definition
10)    cracker
Term

The science of secret writing
Definition
11)    cryptography
Term

Computer attacks from one country on the computing resources of another country with the intent to damage or destroy computer systems or steal sensitive information
Definition
12)    cyberwarfare
Term

A symmetric encryption algorithm developed in the 1970s but still widely used
Definition
13)    Data Encryption Standard (DES)
Term

The process of reversing the effects of encryption, using an algorithm that converts the encoded text back into the original text
Definition
14)    decryption
Term

An attempt to disable a particular Web site by automatically directing many browsers to that site
Definition
15)    denial-of-service (DOS) attack
Term

The process whereby an infected Web site downloads a Trojan horse to the computer of a user visiting that site
Definition
16)    drive-by download/drive-by exploit
Term

A computational device (chip, processor, computer) embedded within another system
Definition
17)    embedded computer/embedded system
Term

The process of using an algorithm to convert information into a representation that cannot be understood or utilized by anyone without the appropriate decryption algorithm
Definition
18)    encryption
Term

A software component that controls access from a network to a computer system
Definition
19)    firewall
Term

Originally, someone proficient at tinkering with computers; now someone who breaks into a computer system for the purpose of doing harm
Definition
20)    hacker
Term

An encryption process that is easy to apply but hard to undo
Definition
21)    hash function
Term

The goal of keeping information protected from those who should not have access to it
Definition
22)    information security
Term

A hidden program that captures the user's passwords and credit card numbers as they are typed
Definition
23)    keystroke logger
Term

Malicious software designed to attack a computer
Definition
24)    malware
Term

A program that automates a brute-force approach to finding a password for a given user ID by encrypting in turn all words in its dictionary using the known hash function
Definition
25)    password-cracking software
Term

The practice of sending widespread e-mails in hopes of luring users to visit a fake Web site, where personal information can be collected
Definition
26)    phishing
Term

A public-key encryption algorithm
Definition
27)    RSA
Term

A series of protocols to ensure secure data transmission on the Web
Definition
28)    Secure Sockets Layer (SSL)
Term

An update, generally to the operating system, that adds new or improved security measures
Definition
29)    security patch
Term

The process of using people to get the information you want
Definition
30)    social engineering
Term

The practice of hiding the very existence of a message, now usually within an image on the Web
Definition
31)    steganography
Term

Any encryption algorithm that encodes one character at a time
Definition
32)    stream cipher
Term

A priviledged user who has access to virtually all services and information stored on the computer; the system administrator
Definition
33)    superuser
Term

An encryption algorithm that requires a secret key shared by sender and receiver
Definition
34)    symmetric encryption algorithm
Term

The person who has access to everything on a computer and who sets up the authorization privileges for all other users
Definition
35)    system administrator
Term

An improved version of SSL
Definition
36)    Transport Layer Security (TLS)
Term

A computer program that does some harmless little job but also contains code to perform malicious attacks
Definition
37)    Trojan horse
Term

A computer program that embeds itself within another program or file in order to infect a host computer and spread
Definition
38)    virus
Term

Similar to a virus, but can send copies of itself to other nodes on a computer network without having to be carried by an infected host file
Definition
39)    worm
Term

Another term for a botnet
Definition
40)    zombie army
Term

For more study material on this topic

click here and go to

my Computer Science Study Help page

Definition

For more study material on this topic

click here and go to

my Computer Science Study Help page

Supporting users have an ad free experience!