Lesson 8 Vocabulary Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Term | Definition |
The right to be forgotten | If you screw up and have damaging stuff online about you, you have the right to have the information removed. |
Authentication | The process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data. |
Digital-certificate | A password- protected, encrypted data file containing message encryption, user identification and message text. |
Digital-signature | An electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time of the signature. |
Non-repudiation | The security principle of providing proof that a transaction occurred between identified parties. Repudiation occurs when one party in a transaction denies that the transaction took place. |
Encryption | A security technique designed to prevent access to information by converting it into a scrambled (unreadable) form of text. |
Decryption | The process of converting encrypted data back to its original form |
Symmetric encryption | An encryption method in which the same key is used to encrypt and decrypt a message. ALso known as a private- key encryption. |
Asymmetric encryption | An encryption method in which 2 keys ( a private key and a public key) are used to encrypt and decrypt a message. Also known as public - key encryption's. |
Hash encryption | An encryption method in which hashes are used to verify the integrity of transmitted messages. Also known as one- way encryptions. |
Hash | Uses hashes to verify the integrity of transmitted messages. |
Secure socket layer | A protocol for secure exchanges. |
Transport layer security | A protocol based on SSL 3.0 that provides authentication and encryption, used by most servers for secure exchanges over the Internet |
Malware | Malware is software designed to harm computer systems. |
Virus | Replicates itself on computer systems, usually through executable software, and causes irreparable system damage. |
Worm | Resides in active memory and replicates itself until an entire disk is full. |
Trojan | Appears to be harmless but produces harmful results |
Illicit server | Installs hidden services on systems |
Anti-virus software | Software that scans disks and programs for known virues and eliminates them. |
Update | A software upgrade that permanently fixes known bugs and improves software performance |
Patch | A temporary bug fix. |
Screen saver | A utility program that displays images or animation on your monitor when your computer is idle |
Typosquatting | Registering a domain name similar to a high-volume site hoping to receive traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in the browser Also known as URL hijacking |
Firewall | A collection of hardware, software and corporate policies that prevents unauthorized access to or from private networks |
Internet control messaging protocol (ICMP) | A subset of Internet Protocol that is most often used to determine whether a computer can communicate with the rest of the network |
Created by:
ericka13
Popular Computers sets