Shared Flashcard Set

Details

tutorial 9
pg 463-464
71
Computer Science
9th Grade
05/22/2006

Additional Computer Science Flashcards

 


 

Cards

Term
active X component
Definition
microsoft technonlogy for writing small applications that perform actions in web pages
Term
ad blocker
Definition
a program that searches and ereases spyware from a user's computer. some ad blockers also prevent the browser from opening pop-ups windows and displaying advertisment
Term
add-on
Definition
a general classicifation of browser extension that includes tools to enhnce your browsing experience, such as toolbars that let you access a search engine without opening its web site, or program that blcoks pop-up ads and additional browsers windows from opening when you view a web site
Term
adware
Definition
a catagory of software hat displays advertisement to help pay for the program
Term
algorithm
Definition
a formula or set of steps to solve a paritcular problem
Term
asymmetric encryption
Definition
a form of encryption that uses 2 different keys, a public key known to everyone and a provate or secret key known only to the person who owns both keys
Term
authenication
Definition
a general term for the process of verifying the idenity of a source or sender of a message
Term
beatnik
Definition
a browser extension that plays sound files stored in various formats on th internet and on many wireless devices
Term
browser extension
Definition
application thats allows a web browser to perform tassk it was not origonal designed to perform , such as playing sound or video files
Term
brute force attack
Definition
the process by which a cracker uses a program to enter character combination until the system accepts a user name and password , thereby gaining access to the system
Term
buffer
Definition
a temporary storage area in a computer's memory
Term
buffered play
Definition
a feature by which music is downloaded and queued for play when the transfer/ play rate exceeds you modem's speed so you do not have to wait for your browser to download the enitre file
Term
certificate authority(CA)
Definition
a trusted third party that verifies the identity of a person or organization in the process of issuing a digital cetifaction
Term
cipher text
Definition
encrpted information
Term
clickstream
Definition
a record of the link clicked by a user while visiting a web site
Term
computer security
Definition
the protction of assets using non-physical means.
Term
countermeasure
Definition
the general name foor a procedure, either phusical or logical, that recognizes, redduces, and eliminates a threat
Term
cracker
Definition
a slng for a person who uses his knowledge of computers and programming to gain unauthorized access to a comp for the purpose of stelaing alternat data
Term
crypyography
Definition
the process of transforming data from a readable format to a unreadable format
Term
decryption
Definition
the process of reviesing encrypted text into readable format
Term
denial of service(DoS) attack
Definition
a security threat wherein in a cracker bombbards a server or other comps with messages in an attemo to consume the networks bandwhich resource effectively disabling the organization's communcations
Term
digital certification
Definition
an ecrypted and password protcted file that contains sufficient info to authenticate and prove person's or organizations identity
Term
digital id
Definition
an electronic file that you phurchase from a certificate authority and install into a program that uses it, such as an e-mail program or web browser.
Term
digital watermark
Definition
a process that inserts a digital pattern containing copyright info into a digital image, animation, or audio video file.
Term
encryption
Definition
a way of scrambling and encoding data transmitted that reduces the risk that a person who interceots the web page as it travels across the internet will be able tro decode and read transmitted contents
Term
extensible 3D (X3D)
Definition
an open standard being developed but the web3d consortium that lets a developer creat 3D worlds
Term
firewall
Definition
a software program or hardware device that contorls access between two networks, such as a local area network and the internet or the internet and a comp
Term
flash player
Definition
a browser plug-in that displays simple animations, user interface, staic graphics, movies, sound, and text that was created using macromedia flash software
Term
hash code function program
Definition
a program that mainmtains the intgerity of an e-mail message by producing a unique indentifying codes called a message authentication code.
Term
helper application
Definition
a program installed ona user's computer that the browser starts and uses to "help" display or play a file
Term
integrity
Definition
a sercurity measure that prevents unauthorized data modification
Term
jave applet
Definition
a small program written in a java programming language
Term
java script program
Definition
a small program that can be executed without first being cmopliled winto computer-readable codes
Term
logical sercurity
Definition
the protection of assets using non-physical means.
Term
login
Definition
the process of identifying yourslef to a comp with a user name and apssword
Term
message authentication code(MAC)
Definition
a unique number that a message digest functions program uses to amintain the integirty of and e-mail message
Term
message digest function program
Definition
a program that maintains the integrity of an e-mail message by producing a unique identifying code called a message authentication code
Term
necessity
Definition
security measures that prevent data delays
Term
packet flooding attack
Definition
a security threat wherein a cracker bombards a server or other computer with message in an attempt to consume the network's bandwidth resources
Term
password manager
Definition
a program that stores login info in a encrypted form on the users hard drive
Term
personal certification
Definition
an electronic file that you phurchase from a certificate authority and install into a program that uses it, such as an e-mail program or web browser.
Term
phishing
Definition
a comp attck in which e-mail message claiming to be from a legitimate business direct recipient to a spoofed web site where the recipient is directed to provide sensitive info so the spoffed web site can steal the recipients personal info
Term
plug-in
Definition
a program that is a software extension of a web browser
Term
port
Definition
a virtual door ina comp that permitts traffic to enter and leave the comp.
Term
port scan
Definition
the process that occurs when one comp tests all or some of the ports of another comp to dtermine whether its ports are open
Term
private key
Definition
in the context of encryption, the key know only to its owner
Term
private key encryption
Definition
a form of encrytion that uses a single key that is known by both the sander and reciever
Term
quicktime
Definition
a browser extemsion that plays video, sound, music, 3d, and virtual reality on macintoshes
Term
realplayer
Definition
a browser plug-in that plays streaming audio and video files
Term
secrecy
Definition
a security measure that prevents unauthorized data disclosure and ensure the authenticity of the data source
Term
secret key
Definition
in the context of encryption, the key know only to its owner
Term
secure sockets layer(SSL)
Definition
a widely used protocal that acts as a serperate layer or "secure channel" on top of the TCP/IP internet protocal.
Term
secure/ multipurpose intenet mail extension (S/MIME)
Definition
a specification which,when combined with a person digital ID, provides authentication and encryption to e-mail messages
Term
security
Definition
the protcetion of assets from unauthorized access, use, alteration, or destrction.
Term
server cetification
Definition
authentication for a web site's users that proves the site's indentity
Term
session key
Definition
a temp key used in the encryption porccess to ensure a secure connection
Term
shockwave player
Definition
a program that you can use during an evaluation period, usually for free
Term
spyware
Definition
software that covertly gathers info about a person or his click stream and sends that info to a third party, often a marketing or research firm
Term
steganography
Definition
a porcess that hides and encryption message within differnt types of files
Term
strong key
Definition
an encryption key that is 128 bits long
Term
symmetric encryption
Definition
a form of encrytion that uses a single key that is known by both the sander and reciever
Term
threat
Definition
any act or object that endangers an asset
Term
trojan horse
Definition
a samll program hidden inside another program that is created with the intent of causing damage
Term
user authentication
Definition
the process of associating a person and his identification with a very high level if assurence
Term
user identifcation
Definition
the process of identifying yourself to a comp, usually b entering a user anem and password known only to you
Term
virtual reality modeling language(VRML)
Definition
an u=internet programming language that creates three-dimensional enviroments that can mimic known worlds or defines fictional ones
Term
web bug
Definition
a small hidden graphic on a web page or in e-mail message that is desighned to work ion conjunction with a cookie ti obtain info about the person viewing the page or e-mail message and to send that info to a third party.
Term
worm
Definition
it is used weaknesses in e-mail programs and operating systems to distribute itself to some of the comp that were then connected to the internet
Term
pysical security
Definition
includes tangible protection device, such as lock, alarms, fireproof doors, securtiy fences, safe vaults, and bombporrf buildings
Term
public key
Definition
is also knowns as private or secret key known only to the person who owns both keys
Term
plane text
Definition
unencrypted info
Supporting users have an ad free experience!