Cybersecurity H Unit 3

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/18

flashcard set

Earn XP

Description and Tags

Last updated 5:28 PM on 3/12/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

19 Terms

1
New cards

firewall

hardware or software that prevents hackers from accessing your personal or company data

2
New cards

antivirus

a program that scans a computer for malicious software and deletes it

3
New cards

spyware

monitors online activities and collects personal information without permission

4
New cards

virus

destroys data and can slow down a computer

5
New cards

Secure the browser and operating system

to use the latest software and security patches/updates

6
New cards

Shodan

a web based device scanner

7
New cards

Service Set Identifier (SSID)

connect to a specific wireless network by the way of a network identifier

8
New cards

disable an SSID broadcast

adds an additional barrier to discovering the network and provides minimal security

9
New cards

encrypt wireless communication

enable wireless security and use WPA2 encryption feature

10
New cards

public Wi-Fi hot spot

a public location to surf the Internet but where it is best not to access or send any sensitive personal information

11
New cards

encrypted VPN

an encrypted connection between a computer and a VPN server to prevent data interception

12
New cards

password manager

a software or service that stores and encrypts different and complex passwords for use with online accounts

13
New cards

How can you make a secure password?

Do not use dictionary words or names in any languages. Do not use common misspellings of dictionary words. Do not use computer names or account names. If possible use special characters, such as ! @ # $ % ^ & * ( ). Use at least a ten character password.

14
New cards

encryption

the process of converting information into a form where an unauthorized party cannot read it

15
New cards

data backup

prevents the loss of irreplaceable data through a local or cloud storage solution

16
New cards

How can you make a file unrecoverable?

Physically destroy the hard drive or storage device.

17
New cards

Two Factor authentication

in addition to a username and password, the requirement of a second token, such as a credit card or phone number, to verify the credentials of a user

18
New cards

Open Authorization (Oauth)

an open standard protocol that allows an end user to access third party applications without exposing the password of the user

19
New cards

Microsoft Internet Explorer: InPrivate, Google Chrome: Incognito, Mozilla Firefox: Private tab / private window, Safari: Private: Private browsing

Methods of keeping Internet browsing history private by automatically disabling cookies, deleting temporary Internet files, and having browsing history removed after closing the window or program