• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back
browse hijacking
a programan or practice that takes control of your browser without your knowledge
brute force attacks
that uses device that controls computers from point
hacking
invading someone else computer
hardware firewall
a device that controls compuetrts form point
keylogger
malicious thqat describe the information keystroks
private key
the part of encrption process that deciphers an conoded to print
public key
the part of recrytion process that encodes a certificate
repetetive strain injury(RSI)
an ijury that can result when a person makes to many of the same motions over a long period time
SECURE SOCKETS LAYER(SSL)
a protocol for managing the secure message transitions on the internet
sniffer
a program that hackers use to capture ID's and password on antework
spyware
software include surreptiously on a personal computer; with the goal of collecting information about the user, the suers' browsing habiats, and other personal information
strong passwords
a password that is complex, and secure it contains numbers, letter, and spcial characters that do not include personal information such as name or birth date
transport layer security(TLS)
a protocoal for maneging the security of message transmisions on the internet