Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Ericka Appana

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Term
Definition
The right to be forgotten   If you screw up and have damaging stuff online about you, you have the right to have the information removed.  
🗑
Authentication   The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data.  
🗑
Digital-certificate   A password- protected, encrypted data file containing message encryption, user identification and message text.  
🗑
Digital-signature   An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time of the signature.  
🗑
Non-repudiation   The security principle of providing proof that a transaction occurred between identified parties. Repudiation occurs when one party in a transaction denies that the transaction took place.  
🗑
Encryption   A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.  
🗑
Decryption   The process of converting encrypted data back to its original form  
🗑
Symmetric encryption   An encryption method in which the same key is used to encrypt and decrypt a message. ALso known as a private- key encryption.  
🗑
Asymmetric encryption   An encryption method in which 2 keys ( a private key and a public key) are used to encrypt and decrypt a message. Also known as public - key encryption's.  
🗑
Hash encryption   An encryption method in which hashes are used to verify the integrity of transmitted messages. Also known as one- way encryptions.  
🗑
Hash   Uses hashes to verify the integrity of transmitted messages.  
🗑
Secure socket layer   A protocol for secure exchanges.  
🗑
Transport layer security   A protocol based on SSL 3.0 that provides authentication and encryption, used by most servers for secure exchanges over the Internet  
🗑
Malware   Malware is software designed to harm computer systems.  
🗑
Virus   Replicates itself on computer systems, usually through executable software, and causes irreparable system damage.  
🗑
Worm   Resides in active memory and replicates itself until an entire disk is full.  
🗑
Trojan   Appears to be harmless but produces harmful results  
🗑
Illicit server   Installs hidden services on systems  
🗑
Anti-virus software   Software that scans disks and programs for known virues and eliminates them.  
🗑
Update   A software upgrade that permanently fixes known bugs and improves software performance  
🗑
Patch   A temporary bug fix.  
🗑
Screen saver   A utility program that displays images or animation on your monitor when your computer is idle  
🗑
Typosquatting   Registering a domain name similar to a high-volume site hoping to receive traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in the browser Also known as URL hijacking  
🗑
Firewall   A collection of hardware, software and corporate policies that prevents unauthorized access to or from private networks  
🗑
Internet control messaging protocol (ICMP)   A subset of Internet Protocol that is most often used to determine whether a computer can communicate with the rest of the network  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: ericka13
Popular Computers sets