210 likes | 343 Views
CIS 105 Survey of Computer Information Systems. Essential Concepts and Terminology Study Unit 11. Identity Theft. . Fraudulent use of another person's identifying information, commonly to establish a credit card account. . Privacy. .
E N D
CIS 105Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11
Identity Theft. • Fraudulent use of another person's identifying information, commonly to establish a credit card account.
Privacy. • In the electronic media context, the ability to restrict or eliminate the collection, use , and sale of personal and confidential information. In the jurisprudence context, the right to be left alone.
Encryption. • The process of coding information so that it can only be understood by the intended recipient.
Defamation. • Injury to another person's reputation by means of false and malicious statements.
Libel. • A false or malicious written or printed statement, or any symbolic representation exposing a person to public defamation.
Cookie. • A file written from a Web server to a client computer's hard disk, usually to record and provide information about the user for future browsing interactions.
Encryption Algorithm. • The step-by-step method for encrypting and decrypting a message.
Symmetric Encryption. • Use of the same cipher key for both encryption and decryption.
Data Encryption Standard (DES). • A commonly-used, symmetric key encryption system developed by United States security agencies.
Strong Encryption. • Encryption methods that are very difficult or impossible to break.
Key Interception. • The theft of a decryption key, the major vulnerability of encryption.
Public Key Encryption (PKE). • An encryption method using two keys, a public key to encrypt messages, and a private key to decrypt known only to the recipient.
Computationally Intensive. • Processing that placed a heavy burden on the processing unit.
Cryptoanalysis. • Techniques used to break codes.
Key Length. • The length, in bits, of an encryption code. Key lengths of 128 bits are considered invulnerable to decryption.
Digital Certificate. • A security method that validates an individual's identity.
Digital Signature. • A technique used to determine if a message has been altered.
Certificate Authority (CA). • A company that verifies the identity of individuals and issues digital certificates attesting to the veracity of identity.
Pretty Good Privacy (PGP). • The most widely used digital signature and certificate system.
End of Study Unit 11. Return to first slide Move to Study Unit 12 CIS 105 Home Page