• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back
browser hijacking
a program or practice that takes control of yuor browser withour your knowledge
brute force attacks
an attack that uses a script or program to log on an account using hundreds or words or phrases stored in a dictionary file. also called a dictionary attack
hacking
invading someone else's computer
hardware firewall
a device that controls computers from one point
keylogger
a malicious program that records key strokes
private key
the part of encryption process that deciphers an encoded certificate
public key
the part of encryption process that encodes a certificate
repetitive strain injury (RSI)
an injury that can result when a person makes too many of the same motions over a long period of time
Secure Sockets Layer (SSL)
a protocol for managing the security of message transmissions on the internet
sniffer
a prgram that hackers use to capture IDs and passwords on a network
spyware
software installed surreptitiously on a personal computer
strong password
a password that is complex and secure- it contains numbers
Transport Layer Security (TLS)
a protocol for managing the security of message transmissions on the internet