Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/9

Click to flip

9 Cards in this Set

  • Front
  • Back
biometrics
technology of authenticating a person's identity by verifying a personal characteristic
denial of service attack
an assault on a computer that is perfromed by hackers whose purpose is to disrupt access to the Web
e-mail filtering
a service used by internet service providers that blocks e-mail messages from designated sources in order to reduce the amount of spam users receive.
encryption
the process of converting readable data into unreadable characters to prevent unauthorized access
firewall
security system consisting of hardware and/or software that prevents unauthorized access to data, information, and storage media on a network
spam
unsolicited e-mail message or newsgroup posting
trojan horse
type of malicious-logic program, named after the Greek myth, that hides within or looks like a legitimate program like a screensaver
virus
potentially damaging program taht affects, or infects, a computer negatively by altering the way the computer works without a user's knowledge or permission
worm
malicious-logic program that resides in active memory and copies itself repeatedly