cis 105 concepts and terminology unit 11 cis 105 survey of computer information systems essential...
TRANSCRIPT
![Page 1: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/1.jpg)
CIS 105 Concepts and Terminology Unit 11
CIS 105
Survey of Computer Information Systems
Essential Concepts and Terminology
Study Unit 11
![Page 2: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/2.jpg)
CIS 105 Concepts and Terminology Unit 11
Identity Theft.
Fraudulent use of another person's identifying information, commonly to establish a credit card account.
![Page 3: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/3.jpg)
CIS 105 Concepts and Terminology Unit 11
Privacy.
In the electronic media context, the ability to restrict or eliminate the collection, use , and sale of personal and confidential information. In the jurisprudence context, the right to be left alone.
![Page 4: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/4.jpg)
CIS 105 Concepts and Terminology Unit 11
Encryption.
The process of coding information so that it can only be understood by the intended recipient.
![Page 5: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/5.jpg)
CIS 105 Concepts and Terminology Unit 11
Defamation.
Injury to another person's reputation by means of false and malicious statements.
![Page 6: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/6.jpg)
CIS 105 Concepts and Terminology Unit 11
Libel.
A false or malicious written or printed statement, or any symbolic representation exposing a person to public defamation.
![Page 7: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/7.jpg)
CIS 105 Concepts and Terminology Unit 11
Cookie.
A file written from a Web server to a client computer's hard disk, usually to record and provide information about the user for future browsing interactions.
![Page 8: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/8.jpg)
CIS 105 Concepts and Terminology Unit 11
Encryption Algorithm.
The step-by-step method for encrypting and decrypting a message.
![Page 9: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/9.jpg)
CIS 105 Concepts and Terminology Unit 11
Symmetric Encryption.
Use of the same cipher key for both encryption and decryption.
![Page 10: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/10.jpg)
CIS 105 Concepts and Terminology Unit 11
Data Encryption Standard (DES).
A commonly-used, symmetric key encryption system developed by United States security agencies.
![Page 11: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/11.jpg)
CIS 105 Concepts and Terminology Unit 11
Strong Encryption.
Encryption methods that are very difficult or impossible to break.
![Page 12: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/12.jpg)
CIS 105 Concepts and Terminology Unit 11
Key Interception.
The theft of a decryption key, the major vulnerability of encryption.
![Page 13: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/13.jpg)
CIS 105 Concepts and Terminology Unit 11
Public Key Encryption (PKE).
An encryption method using two keys, a public key to encrypt messages, and a private key to decrypt known only to the recipient.
![Page 14: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/14.jpg)
CIS 105 Concepts and Terminology Unit 11
Computationally Intensive.
Processing that placed a heavy burden on the processing unit.
![Page 15: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/15.jpg)
CIS 105 Concepts and Terminology Unit 11
Cryptoanalysis.
Techniques used to break codes.
![Page 16: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/16.jpg)
CIS 105 Concepts and Terminology Unit 11
Key Length.
The length, in bits, of an encryption code. Key lengths of 128 bits are considered invulnerable to decryption.
![Page 17: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/17.jpg)
CIS 105 Concepts and Terminology Unit 11
Digital Certificate.
A security method that validates an individual's identity.
![Page 18: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/18.jpg)
CIS 105 Concepts and Terminology Unit 11
Digital Signature.
A technique used to determine if a message has been altered.
![Page 19: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/19.jpg)
CIS 105 Concepts and Terminology Unit 11
Certificate Authority (CA).
A company that verifies the identity of individuals and issues digital certificates attesting to the veracity of identity.
![Page 20: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/20.jpg)
CIS 105 Concepts and Terminology Unit 11
Pretty Good Privacy (PGP).
The most widely used digital signature and certificate system.
![Page 21: CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11](https://reader033.vdocuments.site/reader033/viewer/2022061306/55148625550346b2598b4d25/html5/thumbnails/21.jpg)
CIS 105 Concepts and Terminology Unit 11
End of Study Unit 11.
Return to first slide
Move to Study Unit 12
CIS 105 Home Page