• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back
browser hijacking
program/practice that takes control of your browser without your knowledge
brute force attacks
attack that uses a script/program to log on to an account using hundreds of words/phrases stored in a dictionary file. also called dictionary attack
hacking
invading someone else's computer
hardware firewall
device that controls computers from one point
keylogger
malicious program that records keystrokes
public key
part of ecryption process that encodes a certificate
repetitive strain injury (RSI)
injury that can result when a person makes too many of the same motions over a long period of time
Secure Sockets Layer (SSL)
protocol for mannaging the security of message transmissions
sniffer
program that hackers use to capture IDs and passwords on a network
spyware
to spy on a persons private life without them knowing
strong password
password that is complex and secure
Transport Layer Security (TLS)
protocol for managing the security of messages trasmissions on the Internet
private key
part of encryption process that deciphers an encoded certificate