Upgrade to remove ads
AP Computer - Chapter 8
Terms in this set (24)
a type of program designed to prevent and detect unwanted spyware program installations and to remove those programs if installed. Detection may be either rules-based or based on downloaded definition files that identify currently active spyware programs
a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more
-is the process of giving individuals access to system objects based on their identity
-the process or action of verifying the identity of a user or process
is the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular
A block cipher is a method of encrypting text (to produce ciphertext) in which a cryptographic key and algorithm are applied to a block of data (for example, 64 contiguous bits) at once as a group rather than to one bit at a time.
The Caesar cipher is one of the earliest known and simplest ciphers. It is a type of substitution cipher in which each letter in the plaintext is 'shifted' a certain number of places down the alphabet. For example, with a shift of 1, A would be replaced by B, B would become C, and so on.
-someone who breaks into someone else's computer system, often on a network;
-bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security
the science or study of protecting information by transforming it into a secure format
-The process is called encryption and has been used for a long time
-Used to be to protect handwritten messages but now for digital data
Denial-of-service (DOS) attack
In cryptanalysis and computer security, password cracking is the process of recovering passwords from data that have been stored in or transmitted by a computer system
the attempt to obtain sensitive information such as usernames, passwords, and credit card details, often for malicious reasons, by disguising as a trustworthy entity in an electronic communication.
In the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information.
a user of a computer system with special privileges needed to administer and maintain the system; a system administrator.
a person who is responsible for the upkeep, configuration, and reliable operation of computer systems; especially multi-user computers, such as servers
-A destructive program that looks like a benign and harmless application.
-They cannot replicate themselves.
a type of malicious software program that, when executed, replicates itself by modifying other computer programs and inserting its own code
-A malware computer program that replicates itself in order to spread to other computers.
-They are standalone and can self-replicate.
You might also like...
computers chapter 9
Intro to Computer Science Ch. 5
IT Test 2 Chp 9
Other sets by this creator
AP Biology - Evolution Vocal
AP Computer Principles - Chapter 9
AP Computer- Chapter 7
Other Quizlet sets
Cay Cay 6 (:
FAR MOCK EXAM #3
COD 401 02, ch.7 8 9,cerebrum+consciousness