Vocabulary
Can I Use This?
Use Protection
Watch Out!
200

a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies

firewall

200

Use should do this anytime you want to use material created by someone other than you

cite it!

200

the process of decoding data

decryption

200
a malicious program that can copy itself and gain access to a computer in an unauthorized way

virus

400

The use of material created by someone else without permission and presented as ones' own 

plagiarism

400

the legal right to reproduce, publish, sell, or distribute matter and form of something

copyright

400

the most basic authentication measure used to protect your devices and information

strong password

400

software intended to damage a computing system or to take partial control over its operation 

malware

600

Social Security Number, age, race, phone number are all examples of....

PII: Personally Identifiable Information

600

a public copyright license that enables the free distribution of an otherwise copyrighted work.

creative commons

600

computer access control in which the user is only granted access after successfully presenting several separate pieces of evidence to gain access

multifactor authentication

600

a technique that attempts to trick a user into providing personal information that can then be used to access sensitive online resources

phishing

800

the process of encoding data to prevent unauthorized access

encryption

800

programs that are made freely available and may be redistributed and modified

open source
800
What are the two keys in public key cryptography

public and private

800

the use of a program to record every keystroke made by a user in order to gain fraudulent access to passwords and other confidential information

keylogging

1000

material created on a computer that is owned by the creator or an organization

intellectual property

1000

online research output free of any and all restrictions on access and free of many restrictions on use

open access

1000

Public key encryption is used on the open internet and uses 2 keys for encryption making it an example of ____________ encryption

assymetric
1000

a wireless access point that gives unauthorized access to secure networks

rogue access point