click below
click below
Normal Size Small Size show me how
Ciw lesson 8
Lesson 8
Question | Answer |
---|---|
"The Right to Be Forgotten" | An argument that asks “Do people have the right to remove damaging information about themselves on the Internet so the information can be forgotten?" |
Authentication | the process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data |
Symmetric (private-key) encryption | The same key is used to encrypt and decrypt messages |
Asymmetric (public-key) encryption | The same key is used to encrypt and decrypt messages |
Hash (one-way) encryption | Uses hashes to verify the integrity of transmitted messages |
Digital certificates | you must have the proper digital certificate to gain access |
Non-repudiation | digital signatures prove that a transaction or transmission took place; neither the sender nor the receiver can later deny the action |
Encryption | the process of converting data into an unreadable form of text |
Decryption | the process of converting the encrypted data back to its original form |
Key | a mathematical algorithm |
Update | a software upgrade that permanently fixes known bugs and improves software performance |
Patch | a temporary bug fix |
Virus update | files of virus signature profiles you use to keep your anti-virus software current |
Typosquatting | registering a domain name similar to a high-volume site hoping to receive traffic from users |
Firewall | a collection of hardware, software and corporate policies that prevents unauthorized access to or from private networks |
Licensing | To license copyright-protected material, you must obtain permission from the author |
Trademarks | To register a trademark, you must contact the appropriate agency in your home country |