Shared Flashcard Set

Details

Chapter 9 Terms
Key Terms
72
Computer Science
10th Grade
05/22/2006

Additional Computer Science Flashcards

 


 

Cards

Term
Active X component
Definition
Microsoft's technology for writing small applications that perform actions in Web pages.
Term
ad blocker
Definition
A program that searches for and erases spyware from a user's computer. Some of them also prevent the browser from opening pop-up windows and displaying advertisements.
Term
add-on
Definition
A general classification of browser extensions that includes tools to enhance your browsing experience, such as toolbars that let you access a search engine without opening its Web site, or programs that block pop-up ads and additional browser windows from opening when you view a Web site.
Term
adware
Definition
A category of software that displays advertisements to help pay for the program.
Term
algorithm
Definition
A formula or set of steps to solve a particular problem.
Term
asymmetric encryption
Definition
A form of encryption that uses two different keys, a public key known to everyone and a private or secret key known only to the person who owns both keys. Also called public-key encryption.
Term
authentication
Definition
A general term for the process of verifying the identity of a source or sender of a message.
Term
Beatnik
Definition
A browser extension that plays sound files stored in various formats on the Internet and on many wireless devices.
Term
browser extensions
Definition
Applications that allow a Web browser to perform tasks it was not originally designed to perform, such as playing sound and video files.
Term
brute force attack
Definition
The process by which a cracker uses a program to enter character combinations until the system accepts a user name and password, thereby gaining access to the system.
Term
buffer
Definition
A temporary storage area in a computer's memory.
Term
buffered play
Definition
A feature by which music is downloaded and queued for play when the transfer/play rate exceeds your modem's speed so you do not have to wait for your browser to download the entire file.
Term
certificate authority (CA)
Definition
A trusted third party that verifies the identity of a person or organization in theprocess of issuing a digital certificate.
Term
cipher text
Definition
Encrypted information.
Term
clickstream
Definition
A record of the links clicked by a user while visiting a Web site.
Term
computer security
Definition
The protection of assets using non-physical means. Also called logical security.
Term
countermeasure
Definition
The general name for a procedure, either physical or logical, that recognizes, reduces, or eliminates a threat.
Term
cracker
Definition
A slang term for a person who uses his knowledge of computers and programming to gain unauthorized access to a computer for the purpose of stealing or altering data.
Term
cryptography
Definition
The process of transforming data from a readable format (plain text) to an unreadable format (cipher text).
Term
decryption
Definition
The process of reversing encrypted text into a readable format.
Term
denial of service (DoS) attack
Definition
A security threat wherein a cracker bombards a server or other computer with messages in an attempt to consume the network's bandwidth resources, effectively disabling the organization's communications. Also called packet flooding attack.
Term
digital certificate
Definition
An encrypted and password-protected file that contains sufficient information to authenticate and prove a person's or organization's identity.
Term
digital ID
Definition
An electronic file that you purchase from a certificate authority and install into a program that uses it, such as an e-mail program or Web browser. Also called a personal certificate.
Term
digital watermark
Definition
A process that inserts a digital pattern containing copyright information into a digital image, animation, or audio or video file. It is inserted ito the file using a software program so that it is invisible and undetectable. To the it, a software program unlocks it, retrieving the information it stores.
Term
encryption
Definition
A way of scrambling and encoding data transmissions that reduces the risk that a person who intercepts the Web page as it travels across the Internet will be able to decode and read the transmission's contents.
Term
Extensible 3D (X3D)
Definition
An open standard being developed by the Web3D Consortium that lets a developer create 3D worlds.
Term
firewall
Definition
A software program or hardware device that controls access between two networks, such as a local area network and the Internet or the Internet and a computer.
Term
Flash Player
Definition
A browser plug-in that displays simple animations, user interfaces, static graphics, movies, sound, and text that was created using Macromedia Flash software.
Term
hash code function program
Definition
A program that maintains the integrity of an e-mail message by producing a unique identifying code called a message authentication code (MAC). Also called message digest function program.
Term
helper application
Definition
A program installed on a user's computer that the browser starts and uses to "help" display or play a file.
Term
integrity
Definition
A security measure that prevents unauthorized data modification.
Term
Java applet
Definition
A small program written in the Java programming language.
Term
JavaScript program
Definition
A small program that can be executed without first being compiled into computer-readable codes.
Term
logical security
Definition
The protection of assets using non-physical means. Also called computer security.
Term
login
Definition
The process of identifying yourself to a computer with a user name and password.
Term
message authentication code (MAC)
Definition
A unique number that a message digest function program uses to maintain the integrity of an e-mail message.
Term
message digest function program
Definition
A program that maintains the integrity of an e-mail message by producing a unique identifying code called a message authentication code (MAC). Also called hash code function program.
Term
necessity
Definition
Security measures that prevent data delays (slowing down the transmission of data) or denials (preventing data from getting to its destination).
Term
packet flooding attack
Definition
A security threat wherein a cracker bombards a server or other computer with messages in an attempt to consume the network's bandwidth resources, effectively disabling the organization's communications. Also called denial of service (DoS) attack.
Term
password manager
Definition
A program that stores login information in an encrypted form on the user's hard drive.
Term
personal certificate
Definition
An electronic file that you purchase from a certificate authority and install into a program that uses it, such as an e-mail program or Web browser. Also called a digital ID.
Term
phishing
Definition
A computer attack in which e-mail messages claiming to be from a legitimate business direct recipients to a spoofed Web site where the recipient is directed to provide sensitive information so the spoofed Web site can steal the recipient's personal information.
Term
physical security
Definition
Tangible devices, such as locks, alarms, fireproof doors, security fences, safes or vaults, and bombproof buildings, that protect assets from unauthorized access, use, alteration, or destruction.
Term
plain text
Definition
Unencrypted information.
Term
plug-in
Definition
A program that is a software extension of a Web browser.
Term
port
Definition
A virtual door on a computer that permits traffic to enter and leave the computer. Different types of these handle different forms of communication between a computer and a network or devices, such as a printer.
Term
port scan
Definition
The process that occurs when one computer tests all or some of the ports of another computer to determine whether its ports are open (traffic is not filtered and the port permits entry through it), closed (the port does not accept traffic, but a cracker could use this port to gain entry to and analyze the computer), or stealth (the port might be open or closed, but permits no entry through it).
Term
private key
Definition
In the context or encryption, the key known only to its owner. Also called a secret key.
Term
private-key encryption
Definition
A form of encryption that uses a single key that is known by both the sender and receiver. Also called symmetric encryption.
Term
public key
Definition
In the context of encryption, the key known to everyone.
Term
public-key encryption
Definition
A form of encryption that uses two different keys, a public key known to everyone and a private or secret key known only to the person who owns both keys. Also called asymmetric encryption.
Term
QuickTime
Definition
A browser extension that plays video, sound, music, 3-D, and virtual reality on Macintoshes, PCs, and wireless devices.
Term
RealPlayer
Definition
A browser plug-in that plays streaming audio and video files.
Term
secrecy
Definition
Security measures that prevent unauthorized data disclosure and ensure the authenticity of the data's source.
Term
secret key
Definition
In the context of encryption, the key known only to its owner. Also called a private key.
Term
Secure Sockets Layer (SSL)
Definition
A widely used protocol that acts as a separate layer or "secure channel" on top of the TCP/IP Internet protocol. It provides a security "handshake" when a browser and a Web site want to participate in a secure connection.
Term
Secure/Multipurpose Internet Mail Extensions (S/MIME)
Definition
A specification which, when combined with a person's digital ID, provides authentication and encryption to e-mail messages.
Term
security
Definition
The protection of assets from unauthorized access, use, alteration, or destruction.
Term
server certificate
Definition
Authentication for a Wev site's users that proves the site's identity. It also ensures users that the transfer of data between a user's computer and the server with the certificate is encrypted so that it is both tamperproof and free from being intercepted.
Term
session key
Definition
A temporary key used in the encryption process to ensure a secure connection.
Term
Shockwave Player
Definition
A browser extension that provides animated three-dimensional interfaces, interactive advertisements and product demonstrations, multi-user games, streaming CD-quality audio, and video that was created using Macromedia Director software.
Term
spyware
Definition
Software that covertly gathers information about a person or his click stream and sends that information to a third party, often a marketing or research firm.
Term
steganography
Definition
A process that hides an encrypted message within different types of files.
Term
strong key
Definition
An encryption key that is 128 bits long.
Term
symmetric encryption
Definition
A form of encryption that uses a single key that is known by both the sender and the receiver. Also called private-key encryption.
Term
threat
Definition
Any act or object that endangers an asset.
Term
Trojan horse
Definition
A small program hidden inside another program that is created with the intent of causing damage.
Term
user authentication
Definition
The process of associating a person and his identification with a very high level of assurance.
Term
user identification
Definition
The process of identifying yourself to a computer, usually by entering a user name and password known only to you.
Term
Virtual Reality Modeling Language (VRML)
Definition
An Internet programming language that creates three-dimensional environments that can mimic known words or defined fictional ones.
Term
Web bug
Definition
A small, hidden graphic on a Web page or in an e-mail message that is designed to work in conjunction with a cookie to obtain information about the person viewing the page or e-mail message and to send that information to a third party. Also called a clear GIF or a transparent GIF.
Term
worm
Definition
A program launched by Robert Morris in 1988 that used weaknesses in e-mail programs and operating systems to distribute itself to some of the computers that were then connected to the Internet. The program created multiple copies of itself on the computers it infected, which then consumed the processing power of the infected computers and prevented them from running other programs.
Supporting users have an ad free experience!