Vocabulary for the Code.org unit 4 on Big Data and Privacy.
8231640094 | Big Data | A broad term for datasets so large or complex that traditional data processing applications are inadequate. | 0 | |
8231654515 | Moore's Law | A prediction (made by Gordon Moore) in 1965 that computing power will double every 1.5-2 years. | 1 | |
8231661892 | Privacy Policy | A statement or legal document that discloses some or all of the ways a party gathers, uses, discloses, or manages a customer or client's data. | 2 | |
8231677439 | Encryption | A process of encoding messages to keep them secret so only "authorized" parties can read them. | 3 | |
8231685502 | Decryption | A process of encoding messages to keep them secret so only "authorized" parties can read it. | 4 | |
8231691833 | Cipher | The generic term for a technique (or algorithm) that performs encryption. | 5 | |
8231694406 | Caesar's Cipher | A technique for encryption that shifts the alphabet by some number of characters. | 6 | |
8231705351 | Random Substitution Cipher | An encryption technique that maps each letter of the alphabet to a randomly chosen other letters of the alphabet. | 7 | |
8231713077 | "Cracking" encryption | Attempting to decode a secret message without knowing all the specifics of the cipher. | 8 | |
8231720017 | Frequency Analysis | A technique used to crack a substitution cipher that is based on how frequently certain letters appear in English versus other letters. | 9 | |
8231750462 | Encryption algorithm | Some method of doing encryption. | 10 | |
8231755760 | Encryption key | Specific input that can be used to decrypt data. | 11 | |
8231766529 | Computationally hard | A "hard' problem for a computer to solve which means it cannot arrive at a solution in a reasonable amount of time. | 12 | |
8231776832 | Vigenère Cipher | An encryption algorithm that uses the same key to encrypt and decrypt the data. | 13 | |
8231802533 | Symmetric encryption | The same key is used to encrypt and decrypt the message. | 14 | |
8231806268 | Asymmetric encryption | The key to encrypt the message is different than the key to decrypt the message. | 15 | |
8231812772 | Cryptography | The science concerned with the study of secret communication. | 16 | |
8231815862 | Modulo or "MOD" operation | Finds the remainder after division of one number by another. | 17 | |
8231826074 | Public key encryption | Asymmetric encryption where the encryption key is made public while a separate (different) decryption key is kept private. | 18 | |
8231857546 | One-way function | A mathematical function that is significantly easier to compute in one direction than in the opposite direction. | 19 | |
8231880371 | Secure Sockets Layer (SSL) | The standard security technology for establishing an encrypted link between a web server and a browser. | 20 | |
8231889635 | Transport Layer Security (TLS) | Refers to the latest version of SSL with newer security features. | 21 | |
8231897310 | Virus | A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. | 22 | |
8231907196 | Distribute Denial of Service (DDoS) | A type of attack where multiple virus-infected computers are used to target a single system, overwhelming it with traffic, rendering it useless or unresponsive. | 23 | |
8231912028 | Phishing | The act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. | 24 | |
8231918319 | Antivirus | A software utility that detects, prevents, and removes viruses, worms, and other malware from a computer. | 25 | |
8231930324 | Firewall | A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. | 26 | |
8231947524 | Certificate authorities | Responsible for issuing digital certificates that validate the ownership of encrypted keys used in secure communication . | 27 | |
8231968614 | Digital certificates | Electronic credentials that are used to certify the online identities of individuals, organizations, and computers (similar to online ID cards). Certificates are issued and certified by certificate authorities (CAs). | 28 | |
8231986953 | Metadata | Data that describes other data. | 29 | |
8231990144 | Scalability | The ability of a system to expand to handle a growing amount of work. | 30 | |
8231997936 | Fault tolerant | The ability of a system to continue operating despite a component failure of some type. | 31 |