Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
13 Cards in this Set
- Front
- Back
browser hijacking
|
a program or practice that takes control of your browser without your knowledge
|
|
brute force attacks
|
an attack that uses a script or program to log on to an account using hindreds of words or phrases stored in a dictionary file
|
|
hacking
|
invading someones elses computer
|
|
hardware firewall
|
a device that controls computers from one point
|
|
keylogger
|
a malicious program that records keystrokes
|
|
private key
|
the partof encryption process that deciphers an encoded certificate
|
|
public key
|
the part of encryption process that encodes a certificate
|
|
repetitve strain injury
|
an injury that can result when a person makes too many of the same motions over a long period of time
|
|
secure sockets layer
|
a protocol for managing the security of messaging transmissions on the internet
|
|
sniffer
|
program that hackers use to capture ids and passwords on a network
|
|
spyware
|
software installed surreptitiously on a personal computer with the goal of collecting information about the users the users borwsing habits and other personal information
|
|
strong password
|
a password that is complex and secure it contains numbers, letters, and speciasl characters that do not include personal information such as a name birth of date . in addition to this strong passwords contain at least eight characters and at least one letter number and one character
|
|
transport layer security
|
a protocol for managing the security of message transmissions on the internet
|