1/45
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
active script
this is the script that is used to produce any of the interactive elements of a web page.
bookmark
a link that can be created to allow you to quickly find a web page again.
cascading style sheet (CSS)
a scripting language that is used to create a presentation template for a web page. It includes what kind of font and colour text will appear on the web page.
certificate authority
the awarding organisation that checks if another organisation is real and secure before awarding them a digital certificate.
cookie
small text file that is used to store personal data, by a web browser.
digital certificate
a certificate that is awarded to a website if they can prove that they arc a real organisation and take measures to securely transmit their data.
domain name server (DNS)
a special server that contains a database of domain names and their corresponding IP address.
hypertext markup language (HTML)
a scripting (web authoring) language that is used to create web pages.
hypertext transfer protocol (HTTP)
a protocol that is used for the transmission of web pages and related data across the internet.
hypertext transfer protocol secure (HTTPS)
a secure version of the HTTP that encrypts data for transmission, identifier; a name given to a variable, constant, data structure (e.g. array) or subroutine.
infrastructure
the physical structure, such as all the components and cables, that are used to connect devices.
navigate
move around web pages, or move back or forward to previous web pages.
protocol
a set of rules for transmitting data.
secure sockets layer (SSL) protocol
a type of protocol that encrypts data for transmission. It is the protocol, that is combined with the HTTP to create HTTPS.
tab
a website function that allows you to open multiple web pages in the same window.
uniform resource locater(URL)
another name for the text-based address for a website.
username
a text-based identification that is given to a user that identifies the level of access that they have to stored data and resources
web page
a single page within a website.
web server
a network component where the web pages for a website are stored.
website
a collection of web pages, normally about a related topic or purpose.
world wide web
the collection of all the web pages and websites that have been made available.
blockchain
a method that is used to track all the transactions made with a cryptocurrency.
cryptocurrency
a type of digital currency that uses encryption procedures.
digital currency
a currency that exists electronically rather than physically.
access levels
the amount of direct access a user is given to data and resources. This could be set to be only certain sections of a whole collection of data and resources.
adware
a software based cyber issue that automatically creates popup advertisements.
anti-malware
a type of software that scans a computer or device with the purpose of finding and removing malware.
anti-virus
a type of software that scans a computer for viruses with the purpose of finding and removing them.
biometric device
a device that allows a user to record and input a biometric password.
biometric password
a type of password that uses a person's biological data, such as their fingerprint.
bot
the name given to a computer that has had malware downloaded onto it that will cause it to be used in a DDoS attack.
botnet
a network of bots that are created to carry out a DDoS attack.
brute-force attack
a type of cyber threat that involves repeatedly inputting a password until the correct one is found, to try and break into an account or device.
data interception
intercepting, by technical means, non-public transmissions of digital data to, from or within an information system, including electromagnetic emissions from an information system carrying such digital data.
distributed denial of service (DDoS) attack
a type of cyber threat that targets a web server to cause it to crash and prevent access to the web pages that it stores.
packet sniffer
a piece of software that is used to examine the contents in a packet of data.
pharming
a type of cyber threat that involves downloading malicious software onto a user's hard drive, that redirects a request aimed at a genuine website to a fake website instead. The fake website will encourage the user to input their personal data, allowing it to be stolen.
phishing
a type of cyber threat that involves sending a user a fake email that is designed to look genuine. It will encourage the user to provide their personal data cither by clicking a link to a fake website, or by responding to the email.
proxy server
a method of cyber security that examines requests sent by devices to access the web pages stored on a web server.
ransomware
a software based cyber threat that encrypts a user's data to stop them gaining access to it until a ransom (money) is paid.
spyware
a software based cyber threat that spies on a user's action whilst using a computer, such as logging their key presses.
transport layer security (TLS) protocol
an updated version of the SSL protocol.
trojan horse
a software based cyber threat that is used to disguise other malware to try and smuggle it into a computer or network.
virus
a software based cyber threat that replicates itself with the aim of corrupting data or filling up the available memory space in a computer, causing it to crash.
worm
a software based cyber threat that replicates itself across a network using vulnerabilities that it finds, with the aim of clogging up the bandwidth.
zombie
the name given to a bot that has malware downloaded onto it to allow it to be used in a DDoS attack but it currently isn't being used in this way. It is effectively a dormant or sleeping bot.