• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back
Browser Hijacking
A program or practice that takes control of your browser without your knowledge
Brute Force Attacks
An attack that uses a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file
Hacking
Invading someonw else's computer
Hardware Firewall
A device that controls computers from one point
Keylogger
A malicious program that records keystrokes
Private Key
The part of encryption process that deciphers an encoded certificate
Public Key
The part of encryption process that encodes a certificate
Repetitive Strain Injury (RSI)
An injury that can result when a person makes too many of the same motions over a long period of time
Secure Sockets Layer (SSL)
A protocol for managing the security of message transmissions on the Internet
Sniffer
A program that hackers use to capture IDs and passwords on a network
Spyware
Software installed surreptitiously on a personal computer, with the goal of collecting information about the user's browsing habits, and other personal information
Strong Password
A password that is complex and secure it contains numbers, letters, and special characters
Transport Layer Security (TLS)
A protocol for managing the securitty of message transmissions on the Internet