CIS 105 -- Survey of Computer Information Systems

Essential Concepts and Terminology -- Study Unit 11.

Identity Theft.
Fraudulent use of another person's identifying information, commonly to establish a credit card account.
In the electronic media context, the ability to restrict or eliminate the collection, use , and sale of personal and confidential information. In the jurisprudence context, the right to be left alone.
The process of coding information so that it can only be understood by the intended recipient.
Injury to another person's reputation by means of false and malicious statements.
A false or malicious written or printed statement, or any symbolic representation exposing a person to public defamation.
A file written from a Web server to a client computer's hard disk, usually to record and provide information about the user for future browsing interactions.
Encryption Algorithm.
The step-by-step method for encrypting and decrypting a message.
Symmetric Encryption.
Use of the same cipher key for both encryption and decryption.
Data Encryption Standard (DES).
A commonly-used, symmetric key encryption system developed by United States security agencies.
Strong Encryption.
Encryption methods that are very difficult or impossible to break.
Key Interception.
The theft of a decryption key, the major vulnerability of encryption.
Public Key Encryption (PKE).
An encryption method using two keys, a public key to encrypt messages, and a private key to decrypt known only to the recipient.
Computationally Intensive.
Processing that placed a heavy burden on the processing unit.
Techniques used to break codes.
Key Length.
The length, in bits, of an encryption code. Key lengths of 128 bits are considered invulnerable to decryption.
Digital Certificate.
A security method that validates an individual's identity.
Digital Signature.
A technique used to determine if a message has been altered.
Certificate Authority (CA).
A company that verifies the identity of individuals and issues digital certificates attesting to the veracity of identity.
Pretty Good Privacy (PGP).
The most widely used digital signature and certificate system.


jqjacobs.net/edu   |   CIS 105 Web Site  |  Classes  |  MCC