Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Lesson 8 Vocabulary

Ericka Appana

TermDefinition
The right to be forgotten If you screw up and have damaging stuff online about you, you have the right to have the information removed.
Authentication The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data.
Digital-certificate A password- protected, encrypted data file containing message encryption, user identification and message text.
Digital-signature An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time of the signature.
Non-repudiation The security principle of providing proof that a transaction occurred between identified parties. Repudiation occurs when one party in a transaction denies that the transaction took place.
Encryption A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.
Decryption The process of converting encrypted data back to its original form
Symmetric encryption An encryption method in which the same key is used to encrypt and decrypt a message. ALso known as a private- key encryption.
Asymmetric encryption An encryption method in which 2 keys ( a private key and a public key) are used to encrypt and decrypt a message. Also known as public - key encryption's.
Hash encryption An encryption method in which hashes are used to verify the integrity of transmitted messages. Also known as one- way encryptions.
Hash Uses hashes to verify the integrity of transmitted messages.
Secure socket layer A protocol for secure exchanges.
Transport layer security A protocol based on SSL 3.0 that provides authentication and encryption, used by most servers for secure exchanges over the Internet
Malware Malware is software designed to harm computer systems.
Virus Replicates itself on computer systems, usually through executable software, and causes irreparable system damage.
Worm Resides in active memory and replicates itself until an entire disk is full.
Trojan Appears to be harmless but produces harmful results
Illicit server Installs hidden services on systems
Anti-virus software Software that scans disks and programs for known virues and eliminates them.
Update A software upgrade that permanently fixes known bugs and improves software performance
Patch A temporary bug fix.
Screen saver A utility program that displays images or animation on your monitor when your computer is idle
Typosquatting Registering a domain name similar to a high-volume site hoping to receive traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in the browser Also known as URL hijacking
Firewall A collection of hardware, software and corporate policies that prevents unauthorized access to or from private networks
Internet control messaging protocol (ICMP) A subset of Internet Protocol that is most often used to determine whether a computer can communicate with the rest of the network
Created by: ericka13