cis 105 concepts and terminology unit 11 cis 105 survey of computer information systems essential...
TRANSCRIPT
CIS 105 Concepts and Terminology Unit 11
CIS 105
Survey of Computer Information Systems
Essential Concepts and Terminology
Study Unit 11
CIS 105 Concepts and Terminology Unit 11
Identity Theft.
Fraudulent use of another person's identifying information, commonly to establish a credit card account.
CIS 105 Concepts and Terminology Unit 11
Privacy.
In the electronic media context, the ability to restrict or eliminate the collection, use , and sale of personal and confidential information. In the jurisprudence context, the right to be left alone.
CIS 105 Concepts and Terminology Unit 11
Encryption.
The process of coding information so that it can only be understood by the intended recipient.
CIS 105 Concepts and Terminology Unit 11
Defamation.
Injury to another person's reputation by means of false and malicious statements.
CIS 105 Concepts and Terminology Unit 11
Libel.
A false or malicious written or printed statement, or any symbolic representation exposing a person to public defamation.
CIS 105 Concepts and Terminology Unit 11
Cookie.
A file written from a Web server to a client computer's hard disk, usually to record and provide information about the user for future browsing interactions.
CIS 105 Concepts and Terminology Unit 11
Encryption Algorithm.
The step-by-step method for encrypting and decrypting a message.
CIS 105 Concepts and Terminology Unit 11
Symmetric Encryption.
Use of the same cipher key for both encryption and decryption.
CIS 105 Concepts and Terminology Unit 11
Data Encryption Standard (DES).
A commonly-used, symmetric key encryption system developed by United States security agencies.
CIS 105 Concepts and Terminology Unit 11
Strong Encryption.
Encryption methods that are very difficult or impossible to break.
CIS 105 Concepts and Terminology Unit 11
Key Interception.
The theft of a decryption key, the major vulnerability of encryption.
CIS 105 Concepts and Terminology Unit 11
Public Key Encryption (PKE).
An encryption method using two keys, a public key to encrypt messages, and a private key to decrypt known only to the recipient.
CIS 105 Concepts and Terminology Unit 11
Computationally Intensive.
Processing that placed a heavy burden on the processing unit.
CIS 105 Concepts and Terminology Unit 11
Cryptoanalysis.
Techniques used to break codes.
CIS 105 Concepts and Terminology Unit 11
Key Length.
The length, in bits, of an encryption code. Key lengths of 128 bits are considered invulnerable to decryption.
CIS 105 Concepts and Terminology Unit 11
Digital Certificate.
A security method that validates an individual's identity.
CIS 105 Concepts and Terminology Unit 11
Digital Signature.
A technique used to determine if a message has been altered.
CIS 105 Concepts and Terminology Unit 11
Certificate Authority (CA).
A company that verifies the identity of individuals and issues digital certificates attesting to the veracity of identity.
CIS 105 Concepts and Terminology Unit 11
Pretty Good Privacy (PGP).
The most widely used digital signature and certificate system.
CIS 105 Concepts and Terminology Unit 11
End of Study Unit 11.
Return to first slide
Move to Study Unit 12
CIS 105 Home Page