• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back
Browser Hacking
A program or practice that takes control of your browser without your knowledge
Brute Force Attacks
An attack that uses a script or a program to log on to an account using hundreds of words or phrases stored in a dictionary file
Hacking
Invading someone else's computer
Hardware Firewall
A device that controls computers from one point
Keylogger
A malicious program that records keystrokes
Private Key
The part of encryption process that deciphers an encoded certificate
Public Key
The part of encryption process that encodes a certificate
Repetitive Strain Injury
An injury as a result of making the same motions over a long period of time
Secure Sockets Layer
A protocol for managing the security of message transmissions
Sniffer
A program that hackers use to capture IDs and passwords on a network
Spyware
Software on the computer to keep track of it's use
Strong Password
A password that is complex and secure
Transport Layer Security
A protocol for managing the security of message transmissions on the internet