Encryption
Defense Against the Dark Arts
Authentication
Viruses
Spam
100
Uses two different keys at once - a combination of private keys and public keys
What is Public Key Encryption
100
The process of using part of a person's body to identify them.
What is Biometrics
100
Verifies information from a trusted source
What is Authentication
100
Small piece of software that piggybacks on real programs
What is a virus
100
Unwanted messages that are sent to many users at once
What is Spam
200
Each computer has a secret key code that can encrypt a packet of information. Basically having a secret code.
What is Symmetric Key Encryption
200
Process biometric systems use to collect data
What is Biometric Enrolment
200
A way for a computer to authenticate a source
What is Password; Pass Cards; Digital Signature; Algorithms
200
Computer program that claims to do one thing, but does another
What is a Trojan Horse
200
Scans through thousands of web pages looking for email addresses
What are Spam Bots
300
Computer encryption is based on this
What is Cryptography
300
Two ways to tell if a web browser is using a secure protocol
What is HTTPS and a padlock symbol
300
Account that has full access to all items, regardless of any configured permissions
What is System Administrator Account
300
Form of malware that monitors the user's activities without their knowledge or permission
What is Spyware
300
Programs that are usually free and have advertisemnts built into the software
What is Adware
400
Summary of the original value. Nearly impossible to derive the original number.
What is Hash-Tag Algorithm
400
An independent source that acts as a middle man that both computers trust
What is a Certificate Authority
400
Example of Biometric Authentication
What is Fingerprint Scan; Retina Scan; Face Scan; Voice Identification
400
Scanners that attempt to identify viruses without using definition files
What are Heuristic Scanners
400
Software that tends to take over your browser connection to do their own purposes
What are Hijackers
500
Two ways to ensure data has not been corrupted during the transmission or encryption phases
What is Checksum and CRC
500
Internet security protocol used by Internet browsers and web browsers to transmit sensitive information
What is Secure Socket Layer (SSL)
500
Checksum and CRC are good for preventing
What are Random errors in transmission
500
The worm that infected 250,000 computers in one day
What is the Mydoom worm
500
Filter system that spam filters usually use to examine email and determine how likely it is to be spam based on the words it uses.
What is Bayesian Filtering
Continue
ESC
Reveal Correct Response
Spacebar
M
e
n
u
Team 1
0
+
-
Pages 106-111
No teams
1 team
2 teams
3 teams
4 teams
5 teams
6 teams
7 teams
8 teams
9 teams
10 teams
Custom
Press
F11
Select menu option
View > Enter Fullscreen
for full-screen mode
Edit
•
Print
•
Download
•
Embed
•
Share
JeopardyLabs