• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back
browser hijacking
a program or practice that takes control of your browser without your knowledge
brute force attacks
an attack that uses a script or program to log on to an account using hindreds of words or phrases stored in a dictionary file.
hacking
invading someones elses computer
hardware firewall
a device that controls computers from one point
keylogger
a malicious program that records keystrokes
private key
the partof encryption process that deciphers an encoded certificate
public key
the part of encryption process that encodes a certificate
repetitve strain injury
an injury that can result when a person makes too many of the same motions over a long period of time
secure sockets layer
a protocol for managing the security of messaging transmissions on the internet
sniffer
a program that hackers use to capture ids and passwords on a network
spyware
software installed surreptitiously on a personal computer with the goal of collecting information about the users the users borwsing habits and other personal information
strong password
a password that is complex and secure it contains numbers, letters, and speciasl characters that do not include personal information such as a name birth of date . in addition to this strong passwords contain at least eight characters and at least one letter number and one character
transport layer security
a protocol for managing the security of message transmissions on the internet