• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/11

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

11 Cards in this Set

  • Front
  • Back
trojan horse
hides within or looks like legitimate program until triggered, does not replicate itself on other computers
Worm
Program that copies itself reapeatedly, using up system resources and possibly shutting down the system
Payload
(destructive event) that is delivered when you open file, run infected program, or boot computer with infected disk in disk drive.
Macro/script-types of viruses
exploits trust relationship between office and OS-VBscript computing (called VBA in Office)-often as attachments in email
Virus Signature
known specific pattern of virus code. Also called virus infection.
biometrics
device that authenticates a person's identity by translating a personal characteristic, such as a finger print, into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic
SSL-Secure Sockets Layer
-Security technique that provides encryption of all data that passes between a client and an internet server
Cookie
small text file that a Web server stores on a computer. Some Web sites sell or tade information stored in your cookies.
Encryption
process of converting readable data into unreadable characters to prevenet unauthorized access
Ergonomics
an applied science devoted to incorporating comfort, efficiency, and safety into desgn of items in the workspace
Digital Certificate
A notice that guarentees a user or a Web site is legitimate