Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
13 Cards in this Set
- Front
- Back
Browser Hijacking
|
Remote Controlling/Hacking Of Broswer
|
|
Brute Force Attacks
|
Dictionary Attack; Automates Several Passwords Until Correct Password Is Discovered
|
|
Hacking
|
Illegal Control Of Electronic Data
|
|
Hardware Firewall
|
Single-Point, Central-Controlling Device
|
|
Keylogger
|
Program That Tracks Keystrokes
|
|
Private Key
|
Deciphering Encyrption
|
|
Public Key
|
Deciphering Encyrpted Certificates
|
|
Repetitive Strain Injury (RSI)
|
Injury Arising From Repetitve, Unnatural Motion
|
|
Secure Sockets Layer (SSL)
|
Security System For Electronic Messaging
|
|
Sniffer
|
Wifi Indicator
|
|
Spyware
|
Software That Monitors Computer Activity
|
|
Strong Password
|
Very Effective Password
|
|
Transport Layer Security (TLS)
|
Similar To Secure Sockets Layer; Internet Security
|