Cyber Security and Digital Technology

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

These flashcards cover essential terminology and concepts related to the internet, web technology, digital currency, and cyber security.

Last updated 4:12 PM on 4/14/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

20 Terms

1
New cards

Internet

A global network of interconnected computers and devices that provides the infrastructure for data transmission.

2
New cards

World Wide Web (WWW)

A collection of websites and web pages accessed via the internet using web browsers.

3
New cards

Uniform Resource Locator (URL)

A text-based address assigned to files on the internet, typically consisting of a protocol, a domain name, and a web page/file name.

4
New cards

HTTP

HyperText Transfer Protocol, a protocol for transferring web pages and resources over the internet.

5
New cards

HTTPS

HyperText Transfer Protocol Secure, an extension of HTTP that includes encryption using SSL/TLS for secure communication.

6
New cards

Web Browser

Software application used to access and view content on the World Wide Web, featuring functions like bookmarks, tabs, and navigation tools.

7
New cards

Cookies

Small text files stored on a user’s device by a website, used to save information between visits, such as user preferences or login status.

8
New cards

Digital Currency

A form of money that exists only in electronic form and can be exchanged online, which can be decentralized or centralized.

9
New cards

Blockchain

A digital ledger that is a time-stamped series of records that cannot be altered, used in digital currency transactions.

10
New cards

Brute-force Attack

A method where an attacker tries multiple combinations of usernames and passwords until the correct one is found.

11
New cards

Data Interception

The unauthorized capture of data being transmitted over a network by cybercriminals.

12
New cards

Distributed Denial of Service (DDoS) Attack

An attack that overwhelms a website with excessive traffic, making it slow or inaccessible.

13
New cards

Malicious Software (Malware)

Software designed to harm, exploit, or otherwise compromise computer systems.

14
New cards

Ransomware

A type of malware that encrypts a user's files and demands payment for decryption.

15
New cards

Phishing

A fraudulent technique for obtaining private information by deceiving users into divulging personal details.

16
New cards

Social Engineering

The manipulation of individuals into providing confidential information or performing actions that compromise security.

17
New cards

Authentication

The process of verifying a user’s identity before granting access to a system.

18
New cards

Firewall

A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

19
New cards

Proxy Server

An intermediary server that filters web traffic and can provide anonymity by hiding a user's IP address.

20
New cards

Secure Socket Layer (SSL)

A security protocol that encrypts data transmitted between a user's browser and a web server to prevent interception.