Busy. Please wait.

show password
Forgot Password?

Don't have an account?  Sign up 

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.

Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
remaining cards
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
restart all cards

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CUT5 9.3

Computers: Understanding Tech 5e 9.3

network sniffer A software package that displays network traffic data and can be used to spy and monitor, or to prevent unauthorized activity.
ActiveX A type of program that runs on a web page after downloading itself to the hard drive of the user. Such controls can be useful, but they pose a security risk.
phishing filter An antiphishing tool that works by comparing a site’s URL to a list of known phishing sites and alerting the user if there’s a match. This tool also scans the pages you visit for suspicious signs that a site might not be legitimate.
virus signature A tell-tale string of characters that can be used to identify a particular virus.
rotating backup A backup plan that rotates through a set of backup media. For example, a company might have seven backup sets, one for each day. On each Monday, the administrator overwrites the previous Monday backup with the new one.
incremental backup A backup that includes only the files that have changed since the last backup of any kind.
differential backup A backup that includes only the files that have changed since the last full backup.
backup appliance A special computer system that’s designed specifically for performing and storing backups.
deduplication Operations that reduce the amount of redundancy in a backup set by not backing up identical copies of certain folders and files multiple times.
disaster recovery plan A plan that explains how a company should restore its systems after a complete loss of data.
authentication The process of positively identifying a user. Forms of authentication include personal identification numbers (PINs), user IDs and passwords, smart cards, and biometrics.
strong password A password that’s hard to guess.
smart card A plastic card, similar to a credit card, that contains stored information in a computer chip inside it.
biometric identifier A physical attribute that’s unique to an individual and can be used to authenticate identity, such as a fingerprint or a retinal pattern.
fingerprint scanner A security device that authenticates users by scanning a fingerprint and comparing it to a database of fingerprints of authorized users.
hand geometry system A biometric authentication system that determines a person’s identity by measuring the dimensions of the person’s hand, which are unique to each individual.
computerized facial recognition (CFR) A biometric authentication system that recognizes a human face by comparing it with facial images in a database.
iris recognition A biometric authentication system that uses the unique patterns formed from the measurement of hundreds of details about a user’s irises.
retinal recognition system A biometric authentication system that uses as identifiers the unique patterns of blood vessels found on the backs of eyeballs.
voice verification system A biometric authentication system that recognizes individuals by measuring the pitch and timbre of their voices.
signature verification system An authentication system that works by comparing a scanned-in handwritten signature against signatures in a database to determine if it is a forgery or authentic.
encryption A data security method that involves scrambling information so the data is unreadable until it is decrypted (unscrambled).
ciphertext Encrypted text.
encryption key An algorithm that dictates how data will be encrypted and is used to break the encryption code and read the information. An encryption key is generated automatically and shared between two computers that wish to communicate.
secret key encryption Encryption in which both parties use the same encryption key to encrypt and decrypt the data. Also called private key encryption.
public key encryption An encryption method that uses two encryption keys: a public encryption key, which all authorized users know, and a secret encryption key, which only the sender and the receiver know.
RSA Named for its developers: Rivest, Shamir, and Adleman. A popular public encryption technology used to transmit data over the Internet.
Secure Sockets Layer (SSL) A cryptographic protocol that provides secure communications on the Internet for transmitting data such as that used in credit card activities, emails, faxes, and banking transactions.
Transport Layer Security (TLS) The successor to SSL, originally released as an upgrade to SSL.
Hypertext Transfer Protocol Secure (HTTPS) A secure form of Hypertext Transfer Protocol (HTTP) that provides encryption for data sent through a web-based connection.
Secure HTTP (S-HTTP) A protocol for transmitting data securely over the World Wide Web, designed to transmit individual messages securely.
auditing A review of monitoring data and system logins to look for unauthorized access and suspicious behavior.
Created by: softcrylic