CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential...

21
CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11

Transcript of CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential...

Page 1: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

CIS 105

Survey of Computer Information Systems

Essential Concepts and Terminology

Study Unit 11

Page 2: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

Identity Theft.

Fraudulent use of another person's identifying information, commonly to establish a credit card account.

Page 3: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

Privacy.

In the electronic media context, the ability to restrict or eliminate the collection, use , and sale of personal and confidential information. In the jurisprudence context, the right to be left alone.

Page 4: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

Encryption.

The process of coding information so that it can only be understood by the intended recipient.

Page 5: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

Defamation.

Injury to another person's reputation by means of false and malicious statements.

Page 6: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

Libel.

A false or malicious written or printed statement, or any symbolic representation exposing a person to public defamation.

Page 7: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

Cookie.

A file written from a Web server to a client computer's hard disk, usually to record and provide information about the user for future browsing interactions.

Page 8: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

Encryption Algorithm.

The step-by-step method for encrypting and decrypting a message.

Page 9: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

Symmetric Encryption.

Use of the same cipher key for both encryption and decryption.

Page 10: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

Data Encryption Standard (DES).

A commonly-used, symmetric key encryption system developed by United States security agencies.

Page 11: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

Strong Encryption.

Encryption methods that are very difficult or impossible to break.

Page 12: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

Key Interception.

The theft of a decryption key, the major vulnerability of encryption.

Page 13: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

Public Key Encryption (PKE).

An encryption method using two keys, a public key to encrypt messages, and a private key to decrypt known only to the recipient.

Page 14: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

Computationally Intensive.

Processing that placed a heavy burden on the processing unit.

Page 15: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

Cryptoanalysis.

Techniques used to break codes.

Page 16: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

Key Length.

The length, in bits, of an encryption code. Key lengths of 128 bits are considered invulnerable to decryption.

Page 17: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

Digital Certificate.

A security method that validates an individual's identity.

Page 18: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

Digital Signature.

A technique used to determine if a message has been altered.

Page 19: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

Certificate Authority (CA).

A company that verifies the identity of individuals and issues digital certificates attesting to the veracity of identity.

Page 20: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

Pretty Good Privacy (PGP).

The most widely used digital signature and certificate system.

Page 21: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.

CIS 105 Concepts and Terminology Unit 11

End of Study Unit 11.

Return to first slide

Move to Study Unit 12

CIS 105 Home Page