• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back
browser hijacking
a program or practice that takes control of your browser without your knowledge.
brute force attacts
an attact that uses a script or program to log on to an account using hundreds of words or phrases stored in a dictionary file.
hacking
invading someone else's computer.
hardware firewall
a device that controls computers from one point.
keylogger
a malicious program that records keystrokes.
private key
the part of encryption process that deciphers an encoded certificate.
public key
the part of encryption process that encodes a certificate.
repetitive strain injury (RSI)
an injury that can result when a person makes too many of the same motions over a long period of time.
secure sockets layer (SSL)
a protocol for managing the security od message transmissions on the internet
sniffer
a program that hackers use to capture IDs and passwords on a network.
spyware
a software installed surreptitously on a personal computer, with the goal of collecting informayion bout the user, the user's browsing habits, and other personal information.
strong password
a password that is complex and secure - it contains numbers, letters, and special characters that do not include personal information such as name or birth date.
transport layer security (TLS)
a protocol for managing the security of message transmissions on the internet.