Top Banner

Click here to load reader

CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11

Mar 27, 2015

ReportDownload

Documents

  • Slide 1

CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11 Slide 2 CIS 105 Concepts and Terminology Unit 11 Identity Theft. Fraudulent use of another person's identifying information, commonly to establish a credit card account. Slide 3 CIS 105 Concepts and Terminology Unit 11 Privacy. In the electronic media context, the ability to restrict or eliminate the collection, use, and sale of personal and confidential information. In the jurisprudence context, the right to be left alone. Slide 4 CIS 105 Concepts and Terminology Unit 11 Encryption. The process of coding information so that it can only be understood by the intended recipient. Slide 5 CIS 105 Concepts and Terminology Unit 11 Defamation. Injury to another person's reputation by means of false and malicious statements. Slide 6 CIS 105 Concepts and Terminology Unit 11 Libel. A false or malicious written or printed statement, or any symbolic representation exposing a person to public defamation. Slide 7 CIS 105 Concepts and Terminology Unit 11 Cookie. A file written from a Web server to a client computer's hard disk, usually to record and provide information about the user for future browsing interactions. Slide 8 CIS 105 Concepts and Terminology Unit 11 Encryption Algorithm. The step-by-step method for encrypting and decrypting a message. Slide 9 CIS 105 Concepts and Terminology Unit 11 Symmetric Encryption. Use of the same cipher key for both encryption and decryption. Slide 10 CIS 105 Concepts and Terminology Unit 11 Data Encryption Standard (DES). A commonly-used, symmetric key encryption system developed by United States security agencies. Slide 11 CIS 105 Concepts and Terminology Unit 11 Strong Encryption. Encryption methods that are very difficult or impossible to break. Slide 12 CIS 105 Concepts and Terminology Unit 11 Key Interception. The theft of a decryption key, the major vulnerability of encryption. Slide 13 CIS 105 Concepts and Terminology Unit 11 Public Key Encryption (PKE). An encryption method using two keys, a public key to encrypt messages, and a private key to decrypt known only to the recipient. Slide 14 CIS 105 Concepts and Terminology Unit 11 Computationally Intensive. Processing that placed a heavy burden on the processing unit. Slide 15 CIS 105 Concepts and Terminology Unit 11 Cryptoanalysis. Techniques used to break codes. Slide 16 CIS 105 Concepts and Terminology Unit 11 Key Length. The length, in bits, of an encryption code. Key lengths of 128 bits are considered invulnerable to decryption. Slide 17 CIS 105 Concepts and Terminology Unit 11 Digital Certificate. A security method that validates an individual's identity. Slide 18 CIS 105 Concepts and Terminology Unit 11 Digital Signature. A technique used to determine if a message has been altered. Slide 19 CIS 105 Concepts and Terminology Unit 11 Certificate Authority (CA). A company that verifies the identity of individuals and issues digital certificates attesting to the veracity of identity. Slide 20 CIS 105 Concepts and Terminology Unit 11 Pretty Good Privacy (PGP). The most widely used digital signature and certificate system. Slide 21 CIS 105 Concepts and Terminology Unit 11 End of Study Unit 11. Return to first slide Move to Study Unit 12 CIS 105 Home Page