1/45
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Asymmetric/Public key encryption
A type of encryption that uses a pair of keys: a public key for encryption and a private key for decryption.
Bandwidth
The maximum rate of data transfer across a network path, measured in bits per second.
Caesar Cipher
A substitution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet.
Cipher
An algorithm for performing encryption or decryption.
Computing Device
An electronic device that processes data according to a set of instructions (software).
Computing Innovation
The introduction of new technologies or methods that improve computing processes or capabilities.
Computing Network
A group of interconnected computing devices that can communicate and share resources.
Computing System
A combination of hardware and software that performs computing tasks.
Cracking Encryption
The process of deciphering encrypted data without access to the key.
Datastream
A continuous flow of data that is transmitted over a network.
DDoS
an attack that aims to make a service unavailable by overwhelming it with traffic from multiple sources.
Decryption
The process of converting encrypted data back into its original form.
Digital Divide
The gap between individuals who have access to modern information and communication technology and those who do not.
Domain Name
A human-readable address used to access websites, which is translated into an IP address by DNS.
DNS
a system that translates domain names into IP addresses.
Encryption
The process of converting information or data into a code to prevent unauthorized access.
Fault Tolerant
The ability of a system to continue operating properly in the event of a failure of some of its components.
HTTP
the protocol used for transmitting web pages over the Internet.
HTTPS
an extension of HTTP that uses encryption for secure communication over a computer network.
Internet
A global network of interconnected computers that communicate using standardized protocols.
IP
Internet protocol that has a set of rules for addressing and sending packets across the internet
IP Address
A unique string of numbers separated by periods that identifies each computer using the Internet Protocol to communicate over a network.
Keylogging
The act of recording the keystrokes made by a user on a keyboard, often used maliciously to capture sensitive information. A Malware that tracks whats being typed.
Malware
Malicious software designed to harm, exploit, or otherwise compromise a computer system. (Keylogger, Spyware, Adware, Trojan horse, Root Kit, Worm, Virus)
Man in the Middle
A security breach where a third party intercepts and potentially alters the communication between two parties.
Multifactor Authentication
A security process that requires multiple forms of verification to gain access to a resource.
Packet
A formatted unit of data carried by a packet-switched network.
Packet Metadata
Information about a packet that describes its origin, destination, and other attributes, but not the content itself.
Password Attacks/Theft
Attempts to gain unauthorized access to a system by cracking or stealing passwords.
Path
The route that data takes from one point to another in a network.
Phishing Attacks
Fraudulent attempts to obtain sensitive information by disguising as a trustworthy entity in electronic communications.
Symmetric/Private key encryption
A type of encryption where the same key is used for both encryption and decryption.
Protocol
A set of rules governing the exchange of data between devices in a network.
Ransomware
A type of malware that encrypts a user's files and demands payment for the decryption key.
Redundancy
The inclusion of extra components or systems to ensure reliability and availability in case of failure.
Rogue Access Point
an unauthorized network access point created to trick users into connecting so attackers can intercept data.
Router
A device that forwards data packets between computer networks, directing traffic on the Internet.
Scalability
The capability of a system to handle a growing amount of work or its potential to accommodate growth.
Social Engineering
The psychological manipulation of people into performing actions or divulging confidential information.
SSL
a protocol that encrypts data sent over the internet to protect it from being intercepted.
TCP
protocol that ensures data transfer reliably and correctly
TLS
modern encryption protocol that secures data transmitted over the internet, replacing SSL.
UDP
a protocol that sends packets quickly without guaranteeing order or delivery, prioritizing speed over reliability.
wifi
A technology that allows electronic devices to connect to a wireless local area network (WLAN).
World Wide Web
system of interlinked documents and resources accessed via the Internet.
Zero Day Exploits
Attacks that occur on the same day a vulnerability is discovered, before a fix is available.