1/5
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
encryption
scrambling data to protect it
decryption
undoing encryption of data
phishing
scam emails that trick users into giving personal information
malware
harmful software
firewall
security system to block unauthorized people
authentication
verifying identity