Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
13 Cards in this Set
- Front
- Back
browse hijacking
|
a programan or practice that takes control of your browser without your knowledge
|
|
brute force attacks
|
that uses device that controls computers from point
|
|
hacking
|
invading someone else computer
|
|
hardware firewall
|
a device that controls compuetrts form point
|
|
keylogger
|
malicious thqat describe the information keystroks
|
|
private key
|
the part of encrption process that deciphers an conoded to print
|
|
public key
|
the part of recrytion process that encodes a certificate
|
|
repetetive strain injury(RSI)
|
an ijury that can result when a person makes to many of the same motions over a long period time
|
|
SECURE SOCKETS LAYER(SSL)
|
a protocol for managing the secure message transitions on the internet
|
|
sniffer
|
a program that hackers use to capture ID's and password on antework
|
|
spyware
|
software include surreptiously on a personal computer; with the goal of collecting information about the user, the suers' browsing habiats, and other personal information
|
|
strong passwords
|
a password that is complex, and secure it contains numbers, letter, and spcial characters that do not include personal information such as name or birth date
|
|
transport layer security(TLS)
|
a protocoal for maneging the security of message transmisions on the internet
|