CIA tools

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/13

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 12:08 PM on 7/12/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

14 Terms

1
New cards

Encryption

Scrambles data so only autorized people can read it.

2
New cards

Passwords/Biometrics

Login methods like PINs or fingerprints.

3
New cards

Access Control

Rules that say who can see or do what.

4
New cards

Data Leak

When private info is exposed.

5
New cards

Hashing

A fixed “digital finger print” of data.

6
New cards

Checksums

A number that verifies file accuracy.

7
New cards

Digital Signiture

Cryptographic way to prove something is unchanged and cane from the right sender.

8
New cards

Tampering

When someone modifies data secretly.

9
New cards

Uptime

Time a system is availble and working.

10
New cards

Downtime

Time a system is offline or broken.

11
New cards

DDoS Attack

When attackers flood a system to make it crash.

12
New cards

Redundancy

Extra systems (e.g., back up servers) ready if one fails.

13
New cards

Backups

Saved copies of data.

14
New cards

Access Delays

Slowness or timeouts in systems.