Term
A symmetric encryption algorithm that is newer than DES and uses a longer secret key |
|
Definition
1) Advanced Encryption Standard (AES) |
|
|
Term
Software that checks for the presence of a malicious program to capture personal information that has been entered on Web pages |
|
Definition
|
|
Term
Software designed to catch any possible virus attacks before they occur or to clean up the damage if they do occur |
|
Definition
|
|
Term
An encryption algorithm where the encryption key is made public but the decription key, which is different, is known only to the receiver |
|
Definition
4) asymmetric encryption algorithm/public-key encription algorithm |
|
|
Term
The process of verifying who has the right to gain access to the computer |
|
Definition
|
|
Term
Governs what an authenticated user of a computer is allowed to do |
|
Definition
|
|
Term
Any encryption algorithm that encodes a block of characters together, so that each coded character is the result of several plaintext characters |
|
Definition
|
|
Term
A collection of infected computers under the control of a central site that can direct a DOS attack |
|
Definition
|
|
Term
An encryption algorithm that shifts each character in the message to another character some fixed distance farther along in the alphabet |
|
Definition
|
|
Term
Someone who breaks into a computer system for the purpose of doing harm |
|
Definition
|
|
Term
The science of secret writing |
|
Definition
|
|
Term
Computer attacks from one country on the computing resources of another country with the intent to damage or destroy computer systems or steal sensitive information |
|
Definition
|
|
Term
A symmetric encryption algorithm developed in the 1970s but still widely used |
|
Definition
13) Data Encryption Standard (DES) |
|
|
Term
The process of reversing the effects of encryption, using an algorithm that converts the encoded text back into the original text |
|
Definition
|
|
Term
An attempt to disable a particular Web site by automatically directing many browsers to that site |
|
Definition
15) denial-of-service (DOS) attack |
|
|
Term
The process whereby an infected Web site downloads a Trojan horse to the computer of a user visiting that site |
|
Definition
16) drive-by download/drive-by exploit |
|
|
Term
A computational device (chip, processor, computer) embedded within another system |
|
Definition
17) embedded computer/embedded system |
|
|
Term
The process of using an algorithm to convert information into a representation that cannot be understood or utilized by anyone without the appropriate decryption algorithm |
|
Definition
|
|
Term
A software component that controls access from a network to a computer system |
|
Definition
|
|
Term
Originally, someone proficient at tinkering with computers; now someone who breaks into a computer system for the purpose of doing harm |
|
Definition
|
|
Term
An encryption process that is easy to apply but hard to undo |
|
Definition
|
|
Term
The goal of keeping information protected from those who should not have access to it |
|
Definition
|
|
Term
A hidden program that captures the user's passwords and credit card numbers as they are typed |
|
Definition
|
|
Term
Malicious software designed to attack a computer |
|
Definition
|
|
Term
A program that automates a brute-force approach to finding a password for a given user ID by encrypting in turn all words in its dictionary using the known hash function |
|
Definition
25) password-cracking software |
|
|
Term
The practice of sending widespread e-mails in hopes of luring users to visit a fake Web site, where personal information can be collected |
|
Definition
|
|
Term
A public-key encryption algorithm |
|
Definition
|
|
Term
A series of protocols to ensure secure data transmission on the Web |
|
Definition
28) Secure Sockets Layer (SSL) |
|
|
Term
An update, generally to the operating system, that adds new or improved security measures |
|
Definition
|
|
Term
The process of using people to get the information you want |
|
Definition
|
|
Term
The practice of hiding the very existence of a message, now usually within an image on the Web |
|
Definition
|
|
Term
Any encryption algorithm that encodes one character at a time |
|
Definition
|
|
Term
A priviledged user who has access to virtually all services and information stored on the computer; the system administrator |
|
Definition
|
|
Term
An encryption algorithm that requires a secret key shared by sender and receiver |
|
Definition
34) symmetric encryption algorithm |
|
|
Term
The person who has access to everything on a computer and who sets up the authorization privileges for all other users |
|
Definition
|
|
Term
An improved version of SSL |
|
Definition
36) Transport Layer Security (TLS) |
|
|
Term
A computer program that does some harmless little job but also contains code to perform malicious attacks |
|
Definition
|
|
Term
A computer program that embeds itself within another program or file in order to infect a host computer and spread |
|
Definition
|
|
Term
Similar to a virus, but can send copies of itself to other nodes on a computer network without having to be carried by an infected host file |
|
Definition
|
|
Term
Another term for a botnet |
|
Definition
|
|
Term
For more study material on this topic
click here and go to
my Computer Science Study Help page
|
|
Definition
For more study material on this topic
click here and go to
my Computer Science Study Help page
|
|
|