Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
13 Cards in this Set
- Front
- Back
browse hijacking
|
a program or practice that takes control of your browser without your knowledge
|
|
brute force attacks
|
an attack that uses a script ot program to log on to an account using hundreds of words or phrases stored in a dictionary file
|
|
hacking
|
invading someone else's somputer
|
|
hardware firewall
|
a device that controls computers from one point
|
|
keylogger
|
a malicious program that records keystrokes
|
|
private key
|
the part of encryption process that deciphers an encoded certificate
|
|
public key
|
the pat of encryption process that encodes a certificate
|
|
reptitive strain injury (RSI)
|
an injury that can result when person makes too many of the same motions over a long period of time
|
|
Secure Sockets Layer (SSL)
|
a protocol for managing the security of message transmissions on the Internet
|
|
sniffer
|
a program that hackers use to capture IDs and passwords on a network
|
|
spyware
|
software installed surreptitiously on a personal computer, with the goal of collecting information about the user, the user's browing habits, and other personal information
|
|
strong password
|
a password that is complex and secure - it contains numbers, letters, and special characters that do ot include personal information such as name or birth date. In addition, strong password contain at least eight characters, and at least one letter, number, and special character
|
|
Transport Layer Security (TLS)
|
a protocol for managing the security of message transmissions on the Internet
|