• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/26

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

26 Cards in this Set

  • Front
  • Back
Authentication
Determines the identity of the person requesting access.
Authorization
Determines which actions, rights, or privileges the person has based on the verified identify
Cookies
A small amount of data websites leave on the local computer temporarily.
DOS
Denial of service attack.
An attacker sends so much information to the target's computer system that it cannot be successfully processed and causes a crash.
Digital Certificate
An electronic document attached to a file certifying that the file is from the organization it claims to be.
DDOS
Distributed denial of service attack.
The attacker creates a botnet through malicious software to deliver a coordinated stream of information requests to a target computer.
Firewall
Firewalls prevent unauthorized Internet users from accessing private networks using hardware, software, or a combination of both.
Intrusion Detection System
Designed to detect malicious network traffic.
Keystroke Logger
Software that records your keystrokes and web browsing history.
Malware
Short for malicious software. Is designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems.
Opt-in Model
A business is prohibited from collecting information unless a the customer specifically authorizes it with informed consent.
Opt-out Model
Permits the business to collect personal information until the customer specifically requests that the data not be collected.
Phishing Attack
Involves deception to acquire sensitive information by posing as an official looking email.
Public-key Encryption
Also knows as asymmetric encryption.
Risk Analysis
The process by which an organization weighs the costs of having an asset compromised versus the cost of protecting the asset.
Risk Mitigation
When an organization takes concrete actions against a risk.
SSL
Secure socket layer.
Encrypts and decrypts data between browser and server. Indicated by https://
Social Engineering
An attack where the perpetrator uses social skills to manipulate a legitimate employee into providing confidential company information.
Spyware
Software that collects information about a user without consent.
Trap Door
Allows an attacker access without having to go through security procedures.
Trojan Horse
Software that hide in other computer programs until they are activated.
Tunnelling
Encrypts data packets traveling on a VPN.
VPN
Virtual private network.
A private network that uses a public network to connect users through a client.
Virus
Computer code that performs malicious actions by attaching to another program.
Vulnerability
The possibility that a computer system will suffer harm by a threat.
Worm
Computer code that performs malicious actions and will replicate.