Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

9 Cards in this Set

  • Front
  • Back
technology of authenticating a person's identity by verifying a personal characteristic
denial of service attack
an assault on a computer that is perfromed by hackers whose purpose is to disrupt access to the Web
e-mail filtering
a service used by internet service providers that blocks e-mail messages from designated sources in order to reduce the amount of spam users receive.
the process of converting readable data into unreadable characters to prevent unauthorized access
security system consisting of hardware and/or software that prevents unauthorized access to data, information, and storage media on a network
unsolicited e-mail message or newsgroup posting
trojan horse
type of malicious-logic program, named after the Greek myth, that hides within or looks like a legitimate program like a screensaver
potentially damaging program taht affects, or infects, a computer negatively by altering the way the computer works without a user's knowledge or permission
malicious-logic program that resides in active memory and copies itself repeatedly