1/19
These flashcards cover essential terminology and concepts related to the internet, web technology, digital currency, and cyber security.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Internet
A global network of interconnected computers and devices that provides the infrastructure for data transmission.
World Wide Web (WWW)
A collection of websites and web pages accessed via the internet using web browsers.
Uniform Resource Locator (URL)
A text-based address assigned to files on the internet, typically consisting of a protocol, a domain name, and a web page/file name.
HTTP
HyperText Transfer Protocol, a protocol for transferring web pages and resources over the internet.
HTTPS
HyperText Transfer Protocol Secure, an extension of HTTP that includes encryption using SSL/TLS for secure communication.
Web Browser
Software application used to access and view content on the World Wide Web, featuring functions like bookmarks, tabs, and navigation tools.
Cookies
Small text files stored on a user’s device by a website, used to save information between visits, such as user preferences or login status.
Digital Currency
A form of money that exists only in electronic form and can be exchanged online, which can be decentralized or centralized.
Blockchain
A digital ledger that is a time-stamped series of records that cannot be altered, used in digital currency transactions.
Brute-force Attack
A method where an attacker tries multiple combinations of usernames and passwords until the correct one is found.
Data Interception
The unauthorized capture of data being transmitted over a network by cybercriminals.
Distributed Denial of Service (DDoS) Attack
An attack that overwhelms a website with excessive traffic, making it slow or inaccessible.
Malicious Software (Malware)
Software designed to harm, exploit, or otherwise compromise computer systems.
Ransomware
A type of malware that encrypts a user's files and demands payment for decryption.
Phishing
A fraudulent technique for obtaining private information by deceiving users into divulging personal details.
Social Engineering
The manipulation of individuals into providing confidential information or performing actions that compromise security.
Authentication
The process of verifying a user’s identity before granting access to a system.
Firewall
A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Proxy Server
An intermediary server that filters web traffic and can provide anonymity by hiding a user's IP address.
Secure Socket Layer (SSL)
A security protocol that encrypts data transmitted between a user's browser and a web server to prevent interception.