click below
click below
Normal Size Small Size show me how
Ciw lesson 8
Lesson 8
| Question | Answer |
|---|---|
| "The Right to Be Forgotten" | An argument that asks “Do people have the right to remove damaging information about themselves on the Internet so the information can be forgotten?" |
| Authentication | the process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data |
| Symmetric (private-key) encryption | The same key is used to encrypt and decrypt messages |
| Asymmetric (public-key) encryption | The same key is used to encrypt and decrypt messages |
| Hash (one-way) encryption | Uses hashes to verify the integrity of transmitted messages |
| Digital certificates | you must have the proper digital certificate to gain access |
| Non-repudiation | digital signatures prove that a transaction or transmission took place; neither the sender nor the receiver can later deny the action |
| Encryption | the process of converting data into an unreadable form of text |
| Decryption | the process of converting the encrypted data back to its original form |
| Key | a mathematical algorithm |
| Update | a software upgrade that permanently fixes known bugs and improves software performance |
| Patch | a temporary bug fix |
| Virus update | files of virus signature profiles you use to keep your anti-virus software current |
| Typosquatting | registering a domain name similar to a high-volume site hoping to receive traffic from users |
| Firewall | a collection of hardware, software and corporate policies that prevents unauthorized access to or from private networks |
| Licensing | To license copyright-protected material, you must obtain permission from the author |
| Trademarks | To register a trademark, you must contact the appropriate agency in your home country |