• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/12

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

12 Cards in this Set

  • Front
  • Back
browser hijacking
program or practice that takes control of your browser without your knowledge.
brute force attacks
attack that uses a script or program to log on to an account using hundreds of words
hacking
invading someone else's computer.
hardware firewall
a device that controls computers from one point.
keylogger
a malicious program that records keystrokes.
private key
part of encryption process that deciphers an encoded certificate.
public key
part of encryption process that encodes a certificate.
repetitive strain injury
injury that can result when a person makes too many of the same motions over a long period of time.
sniffer
program that hackers use to capture IDs and passwords on a network.
spyware
software installed surreptitiously on a personal computer.
strong password
a password that is complex
transport layer security
protocol for managing the security of message transmissions on the internet.