• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back
browser hijacking
program or practice that takes control of your browser without your knowledge
brute force attacks
attack that uses a script or program to log on to an account using hundrids of words or phrasesstored in a dictionary file. Also called a Dictionary attack.
hacking
invading someone elses computer
hardware firewall
device that controls computers from one point
keylogger
a malicious program that records keystrokes
private key
the part of encryption process that deciphers an encoded certificate
public key
the part of encryption process that encodes a certificate
repetitive strain injury (RSI)
an injury that can result when a person makes too many of the same motions over a long period of time
Secure Socket Layer (SSL)
a protocol for managing the security of message transmissions on the internet
sniffer
a program that hackers use to capture IDs and passwords on a network
spyware
software installed surreptitiously on a personal computer, with the goal of collecting information about the user, the user's browsing habits, and other personal information.
strong password
password that is complex and secure.
Transport Layer Security (TLS)
protocol for managing the security of message transmissions on the Internet.