Ericka Appana
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
The right to be forgotten | If you screw up and have damaging stuff online about you, you have the right to have the information removed.
🗑
|
||||
Authentication | The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data.
🗑
|
||||
Digital-certificate | A password- protected, encrypted data file containing message encryption, user identification and message text.
🗑
|
||||
Digital-signature | An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time of the signature.
🗑
|
||||
Non-repudiation | The security principle of providing proof that a transaction occurred between identified parties. Repudiation occurs when one party in a transaction denies that the transaction took place.
🗑
|
||||
Encryption | A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text.
🗑
|
||||
Decryption | The process of converting encrypted data back to its original form
🗑
|
||||
Symmetric encryption | An encryption method in which the same key is used to encrypt and decrypt a message. ALso known as a private- key encryption.
🗑
|
||||
Asymmetric encryption | An encryption method in which 2 keys ( a private key and a public key) are used to encrypt and decrypt a message. Also known as public - key encryption's.
🗑
|
||||
Hash encryption | An encryption method in which hashes are used to verify the integrity of transmitted messages. Also known as one- way encryptions.
🗑
|
||||
Hash | Uses hashes to verify the integrity of transmitted messages.
🗑
|
||||
Secure socket layer | A protocol for secure exchanges.
🗑
|
||||
Transport layer security | A protocol based on SSL 3.0 that provides authentication and encryption, used by most servers for secure exchanges over the Internet
🗑
|
||||
Malware | Malware is software designed to harm computer systems.
🗑
|
||||
Virus | Replicates itself on computer systems, usually through executable software, and causes irreparable system damage.
🗑
|
||||
Worm | Resides in active memory and replicates itself until an entire disk is full.
🗑
|
||||
Trojan | Appears to be harmless but produces harmful results
🗑
|
||||
Illicit server | Installs hidden services on systems
🗑
|
||||
Anti-virus software | Software that scans disks and programs for known virues and eliminates them.
🗑
|
||||
Update | A software upgrade that permanently fixes known bugs and improves software performance
🗑
|
||||
Patch | A temporary bug fix.
🗑
|
||||
Screen saver | A utility program that displays images or animation on your monitor when your computer is idle
🗑
|
||||
Typosquatting | Registering a domain name similar to a high-volume site hoping to receive traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in the browser Also known as URL hijacking
🗑
|
||||
Firewall | A collection of hardware, software and corporate policies that prevents unauthorized access to or from private networks
🗑
|
||||
Internet control messaging protocol (ICMP) | A subset of Internet Protocol that is most often used to determine whether a computer can communicate with the rest of the network
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
ericka13
Popular Computers sets