1/21
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Network Security
A field of computer science focused on protecting networks and their services from unauthorized access, damage, or disruption.
Network Anonymity
The condition of keeping the identity of the sender and receiver private during digital communication.
K-anonymity
A privacy measure that ensures a person's information cannot be distinguished from at least 'k' other individuals.
Identity Privacy
The right to keep one's identity hidden from others, particularly in digital communications.
Whistleblower
An individual who exposes illicit or unethical practices within an organization while wishing to remain anonymous.
IP Address
A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
Encryption
The process of converting information or data into a code to prevent unauthorized access.
Unlinkability
A property that ensures actions or items cannot be linked or connected to an individual's identity.
Proxy Server
An intermediary server that separates end users from the websites they browse, often used to reduce anonymity.
Traffic Mixing
A technique that waits for multiple messages before sending them out to obscure their source and destination.
Tor
A free, open-source software that enables anonymous communication over the internet.
Onion Services
Services accessible only via Tor, designed to provide enhanced privacy for both the user and the service provider.
Fingerprinting
A technique used to collect information about a device's settings and characteristics to create a unique identifier.
Observability
The ability to detect the presence or actions of a communication or data packet by observing unencrypted traffic.
Intrusion Detection System (IDS)
A device or software application that monitors networks or systems for malicious activity or policy violations.
Intrusion Prevention System (IPS)
A network security device that monitors network traffic for suspicious activity and takes action to prevent it.
Differential Privacy
A technique used to ensure that the privacy of individuals in a dataset is maintained when statistical queries are performed.
Firewall
A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Cloud Security
A collection of policies and technologies that protect cloud-based data, applications, and infrastructures.
Eavesdropping
The act of secretly listening to private conversations or communications, often for the purpose of espionage.
Malicious Actor
An individual or entity that engages in harmful activities, particularly online, such as hacking or fraud.
Mass Surveillance
The large-scale monitoring of individual behaviors and activities, often conducted by governments or organizations.