1/13
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Big Data
Large data sets that are infeasible or impossible to traditionally process.
Machine Learning
Used to find correlations in big data.
Anonymize the data
The process of removing personally identifiable information from data sets.
Obfuscating Data
The practice of making data unclear or unintelligible.
Hashing Passwords
Transforming a password into a fixed-size string of characters, which is typically a digest that represents the data.
Malware
Any kind of malicious software.
Virus
A type of malware that copies itself to other computers.
Phishing Attack
Sending a message while impersonating a legitimate website.
DDoS (Distributed Denial of Service)
Multiple computers target a server with a flood of HTTP requests, overwhelming it, all controlled by a botnet.
DNS
Domain Name System; translates domain names to IP addresses.
Symmetric Cryptography
Encryption that is fast but requires a shared secret.
Asymmetric Cryptography
Encryption that does not need a shared secret, but is slower.
Certificate Authority
An entity that issues digital certificates for use in asymmetric cryptography.
TLS handshake protocol
A process that establishes a secure connection between a client and a server.