• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back
browse hijacking
a program or practice that takes control of your browser without your knowledge
brute force attacks
an attack that uses a script ot program to log on to an account using hundreds of words or phrases stored in a dictionary file
hacking
invading someone else's somputer
hardware firewall
a device that controls computers from one point
keylogger
a malicious program that records keystrokes
private key
the part of encryption process that deciphers an encoded certificate
public key
the pat of encryption process that encodes a certificate
reptitive strain injury (RSI)
an injury that can result when person makes too many of the same motions over a long period of time
Secure Sockets Layer (SSL)
a protocol for managing the security of message transmissions on the Internet
sniffer
a program that hackers use to capture IDs and passwords on a network
spyware
software installed surreptitiously on a personal computer, with the goal of collecting information about the user, the user's browing habits, and other personal information
strong password
a password that is complex and secure - it contains numbers, letters, and special characters that do ot include personal information such as name or birth date. In addition, strong password contain at least eight characters, and at least one letter, number, and special character
Transport Layer Security (TLS)
a protocol for managing the security of message transmissions on the Internet