One of the buzzwords of computer system geeks, this one can mean anything; it is generally accepted to mean someone with more skill than an average user, maybe a white hat (good guy) or black hat (bad guy).
Hacker
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Adware
_____ state means data actions being performed by “endpoint devices”
Data in-use
This Key handling procedure is a temporary status to remove the key from use.
Suspension
Attackers who use hacking tools that they don't really understand
Script kiddies
The act of digging through trash receptacles to find information that can be useful in an attack.
Dumpster Diving
___ manipulates an entire block of plaintext at one time.
Block Cipher
This Key handling procedure is an extension to the life of a key about to expire
Renewal
A person or element with the power to carry out a threat
Threat actor
A phishing attack that automatically redirects the user to a fake site.
Pharming
A symmetric cipher approved by the NIST in 2000 as a replacement for DES and performs three steps on every block (128 bits) of plaintext
Advanced Encryption Standard (AES)
A set of rules that dictate what the CAs, RAs, and other entities must do to operate.
Certificate Policy
Part of 3 types of information protection(often called CIA) and it is defined as when Information is accessible to authorized users
Availability
Computer code that lies dormant until it is triggered by a specific logical event.
Logic Bomb
_____ is the most common asymmetric cryptography algorithm
RSA
_________is a protocol that can move or copies files in a TCP/IP environment.
File Transfer Protocol (FTP)
Part of 3 types of information protection(often called CIA) and it is defined as when only approved individuals may access information
Confidentiality
Captures and stores each keystroke that a user types on the computer's keyboard.
Keylogger
_____ is a threat actor forces the system to abandon the current higher security mode of operation and instead “fall back” to implementing an older and less secure mode
Downgrade Attack
________uses digital certificates to protect email.
S/MIME