AP Review #3 — Cybersecurity

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/13

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

14 Terms

1
New cards

Big Data

Large data sets that are infeasible or impossible to traditionally process.

2
New cards

Machine Learning

Used to find correlations in big data.

3
New cards

Anonymize the data

The process of removing personally identifiable information from data sets.

4
New cards

Obfuscating Data

The practice of making data unclear or unintelligible.

5
New cards

Hashing Passwords

Transforming a password into a fixed-size string of characters, which is typically a digest that represents the data.

6
New cards

Malware

Any kind of malicious software.

7
New cards

Virus

A type of malware that copies itself to other computers.

8
New cards

Phishing Attack

Sending a message while impersonating a legitimate website.

9
New cards

DDoS (Distributed Denial of Service)

Multiple computers target a server with a flood of HTTP requests, overwhelming it, all controlled by a botnet.

10
New cards

DNS

Domain Name System; translates domain names to IP addresses.

11
New cards

Symmetric Cryptography

Encryption that is fast but requires a shared secret.

12
New cards

Asymmetric Cryptography

Encryption that does not need a shared secret, but is slower.

13
New cards

Certificate Authority

An entity that issues digital certificates for use in asymmetric cryptography.

14
New cards

TLS handshake protocol

A process that establishes a secure connection between a client and a server.