Cybersecurity H Unit 3

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

firewall

1 / 18

flashcard set

Earn XP

Description and Tags

19 Terms

1

firewall

hardware or software that prevents hackers from accessing your personal or company data

New cards
2

antivirus

a program that scans a computer for malicious software and deletes it

New cards
3

spyware

monitors online activities and collects personal information without permission

New cards
4

virus

destroys data and can slow down a computer

New cards
5

Secure the browser and operating system

to use the latest software and security patches/updates

New cards
6

Shodan

a web based device scanner

New cards
7

Service Set Identifier (SSID)

connect to a specific wireless network by the way of a network identifier

New cards
8

disable an SSID broadcast

adds an additional barrier to discovering the network and provides minimal security

New cards
9

encrypt wireless communication

enable wireless security and use WPA2 encryption feature

New cards
10

public Wi-Fi hot spot

a public location to surf the Internet but where it is best not to access or send any sensitive personal information

New cards
11

encrypted VPN

an encrypted connection between a computer and a VPN server to prevent data interception

New cards
12

password manager

a software or service that stores and encrypts different and complex passwords for use with online accounts

New cards
13

How can you make a secure password?

Do not use dictionary words or names in any languages. Do not use common misspellings of dictionary words. Do not use computer names or account names. If possible use special characters, such as ! @ # $ % ^ & * ( ). Use at least a ten character password.

New cards
14

encryption

the process of converting information into a form where an unauthorized party cannot read it

New cards
15

data backup

prevents the loss of irreplaceable data through a local or cloud storage solution

New cards
16

How can you make a file unrecoverable?

Physically destroy the hard drive or storage device.

New cards
17

Two Factor authentication

in addition to a username and password, the requirement of a second token, such as a credit card or phone number, to verify the credentials of a user

New cards
18

Open Authorization (Oauth)

an open standard protocol that allows an end user to access third party applications without exposing the password of the user

New cards
19

Microsoft Internet Explorer: InPrivate, Google Chrome: Incognito, Mozilla Firefox: Private tab / private window, Safari: Private: Private browsing

Methods of keeping Internet browsing history private by automatically disabling cookies, deleting temporary Internet files, and having browsing history removed after closing the window or program

New cards

Explore top notes

note Note
studied byStudied by 7 people
... ago
5.0(2)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 1 person
... ago
4.0(1)
note Note
studied byStudied by 25 people
... ago
5.0(1)
note Note
studied byStudied by 5 people
... ago
5.0(1)
note Note
studied byStudied by 7 people
... ago
5.0(1)
note Note
studied byStudied by 16 people
... ago
5.0(1)
note Note
studied byStudied by 118 people
... ago
5.0(1)

Explore top flashcards

flashcards Flashcard (60)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (82)
studied byStudied by 138 people
... ago
4.5(2)
flashcards Flashcard (61)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (22)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 19 people
... ago
5.0(1)
flashcards Flashcard (80)
studied byStudied by 17 people
... ago
5.0(1)
flashcards Flashcard (24)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (55)
studied byStudied by 34 people
... ago
5.0(1)
robot