• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/16

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

16 Cards in this Set

  • Front
  • Back
browser hijacking
a program or practice that takes control of yuor browser withour your knowledge
brute force attacks
an attack that uses a script or program to log on an account using hundreds or words or phrases stored in a dictionary file. also called a dictionary attack
hacking
invading someone else's computer
hardware firewall
a device that controls computers from one point
keylogger
a malicious program that records key strokes
private key
the part of encryption process that deciphers an encoded certificate
public key
the part of encryption process that encodes a certificate
repetitive strain injury (RSI)
an injury that can result when a person makes too many of the same motions over a long period of time
Secure Sockets Layer (SSL)
a protocol for managing the security of message transmissions on the internet
sniffer
a prgram that hackers use to capture IDs and passwords on a network
spyware
software installed surreptitiously on a personal computer
strong password
a password that is complex and secure- it contains numbers
Transport Layer Security (TLS)
a protocol for managing the security of message transmissions on the internet
true
some spyware didguises itself as antispyware to gaim access to your system
true
before providing inforation or credit card info on a e commerse site,
true
old computer hardware such as monitors can create