CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

Post on 27-Mar-2015

217 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

Transcript

CIS 105 Concepts and Terminology Unit 11

CIS 105

Survey of Computer Information Systems

Essential Concepts and Terminology

Study Unit 11

CIS 105 Concepts and Terminology Unit 11

Identity Theft.

Fraudulent use of another person's identifying information, commonly to establish a credit card account.

CIS 105 Concepts and Terminology Unit 11

Privacy.

In the electronic media context, the ability to restrict or eliminate the collection, use , and sale of personal and confidential information. In the jurisprudence context, the right to be left alone.

CIS 105 Concepts and Terminology Unit 11

Encryption.

The process of coding information so that it can only be understood by the intended recipient.

CIS 105 Concepts and Terminology Unit 11

Defamation.

Injury to another person's reputation by means of false and malicious statements.

CIS 105 Concepts and Terminology Unit 11

Libel.

A false or malicious written or printed statement, or any symbolic representation exposing a person to public defamation.

CIS 105 Concepts and Terminology Unit 11

Cookie.

A file written from a Web server to a client computer's hard disk, usually to record and provide information about the user for future browsing interactions.

CIS 105 Concepts and Terminology Unit 11

Encryption Algorithm.

The step-by-step method for encrypting and decrypting a message.

CIS 105 Concepts and Terminology Unit 11

Symmetric Encryption.

Use of the same cipher key for both encryption and decryption.

CIS 105 Concepts and Terminology Unit 11

Data Encryption Standard (DES).

A commonly-used, symmetric key encryption system developed by United States security agencies.

CIS 105 Concepts and Terminology Unit 11

Strong Encryption.

Encryption methods that are very difficult or impossible to break.

CIS 105 Concepts and Terminology Unit 11

Key Interception.

The theft of a decryption key, the major vulnerability of encryption.

CIS 105 Concepts and Terminology Unit 11

Public Key Encryption (PKE).

An encryption method using two keys, a public key to encrypt messages, and a private key to decrypt known only to the recipient.

CIS 105 Concepts and Terminology Unit 11

Computationally Intensive.

Processing that placed a heavy burden on the processing unit.

CIS 105 Concepts and Terminology Unit 11

Cryptoanalysis.

Techniques used to break codes.

CIS 105 Concepts and Terminology Unit 11

Key Length.

The length, in bits, of an encryption code. Key lengths of 128 bits are considered invulnerable to decryption.

CIS 105 Concepts and Terminology Unit 11

Digital Certificate.

A security method that validates an individual's identity.

CIS 105 Concepts and Terminology Unit 11

Digital Signature.

A technique used to determine if a message has been altered.

CIS 105 Concepts and Terminology Unit 11

Certificate Authority (CA).

A company that verifies the identity of individuals and issues digital certificates attesting to the veracity of identity.

CIS 105 Concepts and Terminology Unit 11

Pretty Good Privacy (PGP).

The most widely used digital signature and certificate system.

CIS 105 Concepts and Terminology Unit 11

End of Study Unit 11.

Return to first slide

Move to Study Unit 12

CIS 105 Home Page

top related