1/13
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Encryption
Scrambles data so only autorized people can read it.
Passwords/Biometrics
Login methods like PINs or fingerprints.
Access Control
Rules that say who can see or do what.
Data Leak
When private info is exposed.
Hashing
A fixed “digital finger print” of data.
Checksums
A number that verifies file accuracy.
Digital Signiture
Cryptographic way to prove something is unchanged and cane from the right sender.
Tampering
When someone modifies data secretly.
Uptime
Time a system is availble and working.
Downtime
Time a system is offline or broken.
DDoS Attack
When attackers flood a system to make it crash.
Redundancy
Extra systems (e.g., back up servers) ready if one fails.
Backups
Saved copies of data.
Access Delays
Slowness or timeouts in systems.