Java Games: Flashcards, matching, concentration, and word search.

IBF Lesson 7 Terminology

This series of exercises have been created to help you with the terminology associated with this lesson in the Internet Business Foundations module.

AB
KeyA variable value, such as a numeric code, that uses an algorithm to encrypt and decrypt data.
Symmetric-Key EncryptionAn encryption method in which the same key is used to encrypt and decrypt a message.
Asymmetric-Key EncryptionAn encryption method in which two keys are used to encrypt and decrypt a message.
Hash EncryptionAn encryption method in which hashes are used to verify the integrity of transmitted messages.
HashA number generated by an algorithm from a text string.
Digital CertificateA password protected, encrypted data file containing message encryption, user identification and message text.
Digital SignatureAn electronic stamp added to a message that uniquely identifies its source and verifies its contents at the time of the signature.
Non-RepudiationThe security principle of providing proof that a transaction occurred between identified parties.
FirewallA security barrier that controls the flow of information between the Internet and private networks. Prevents outsiders from accessing and enterprise's internal network.
Internet Control Messaging Protocol (ICMP)A subset of IP that is most often used to determine whether a computer can communicate with the rest of the network.
MalwareAbbreviation for malicious software designed to harm computer systems.
VirusA malicious program that replicates itself on computer systems, usually through executable software, and causes irreparable system damage.
WormA self replicating program or algorithm that consumes system resources.
Trojan HorseA program disguised as a harmless application that actually produces harmful results.
Illicit ServerAn application that installs hidden services on systems.
Antivirus SoftwareSoftware that scans disks and program for known viruses and eliminates them.
SpywareA software application secretly placed on a users system to gather information and relay it to outside parties, usually for advertising purposes.
UpdateA file or collection of tools that resolves system liabilities and improves software performance.
PatchProgramming code that provides a temporary solution to a known problem, or bug.
Screen SaverA graphic or moving image that appears on your screen when your computer is idle.
List ServerA server that collects and distributes information from an authorized group of participants.
Listserve GroupUsers who subscribe to an e-mailing list through a list server.


Stephen

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities