1/79
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Bandwidth
The maximum theoretical rate that data can be sent over a network connection
Bluetooth
a wireless technology for communication between devices that are near each other
caching
the process of storing images or other data on a user’s computer to increase download speed
circuit switching
a computer networking method that uses a dedicated and private wire
client
any one of the devices that is part of a network
data
any information that a computer can store or transmit (e.g., numbers, letters, or symbols)
Domain Name System
a server that matches an IP address to the domain name (DNS)
ethernet
a commonplace computer networking protocol used for local area networks (LANs) that use cables to connect computers and servers
firewall
a security tool designed to block unauthorized access to a network while allowing data to flow out to the internet
Internet Protocol
the principle communication protocol for the internet; provides the basis for IP addresses to communicate with one another (IP)
Internet Protocol Address
the numerical address associated with every website (IP address)
internet service provider
a company or organization that provides access to the internet (ISP)
intranet
a website only available on an internal network
load
the amount of data being requested by a network, either download or upload; also used for the act of downloading web pages and files
Local Area Network
a group of computers that share communication lines (LAN)
message switching
a computer networking method that requires you to pass your message along several different stops
modem
a network device that passes data between a local network to the internet
network
a group of interconnected computers or other devices
Network Interface Card
the hardware component that connects a device to the network (NIC)
packet
encapsulated data that can be delivered over a network
pixel
a small square of a single color; digital images are formed of pixels
protocol
a set of rules
router
a device that receives and sends data between devices within a network
routing
the selection of the path that data takes from transmitter to receiver
server
a computer or program that controls access to common resources; the brains of a network
throughput
the actual rate of data transfer
topology
the way a network is arranged and the various parts of the network
uniform resource locator
the unique web address of a resource, such as a website, accessible over the internet (URL)
bus topology
all devices connected to a single cable
business continuity planning
the plans a business makes that help it to recover from a security crisis
cloud
servers that are physically located at data centers and rented out to host data and websites for organizations and individuals
cyber-physical attack
when important infrastructure, such as electricity grids, water treatment systems, transportation systems, military defense systems, and large companies, is targeted through the use of technology
cybercriminal
a person who use technology to steal, defraud, harm, and extort
cybersecurity
the protection of technology systems and devices
encrypt
to scramble information or put it in secret code
hacking
a method cybercriminals use to break into IT systems
intellectual property
a person’s creations such as art and inventions
least privilege access
the principle that staff should only have the minimum access they need to perform their duties
malware
malicious software that damages and/or gains access to your computer
node
a single device in a networkÂ
phishing
when a cybercriminal poses as a trustworthy source, such as a bank, in an attempt to obtain sensitive information
PPRR risk management model
a process used to manage risk that stands for prevention, preparedness, response, and recovery
preparedness
ensuring the necessary steps have been taken before a security incident occurs; this includes effective response and recovery plans
prevention
taking actions that eliminate or reduce the possibility or effects of a security breach
ransomware
a kind of malware that aims to scramble or encrypt data, and then demands a ransom to unscramble the data
recovery
the steps that must be taken to minimize recovery and disruption times
response
effectively containing, minimizing, and controlling the effects of a security incident
security configuration
how security measures are implemented and built into security systems
spam
digital communication, such as an email, that is sent out in bulk and is unsolicitedÂ
spyware
a kind of malware used to spy on people and gather information about them
star topology
each device has a separate cable going to a central device
state-sponsored attack
when governments use cyber skills to infiltrate other governments and attack critical infrastructure
advanced persistent threat
a nation or state-sponsored group of people whose aim is access to computer networks and who work for a sustained period of time before being detected (APT)
biometric authentication
authentication credentials based on the user’s physical characteristics, such as a fingerprint or facial recognition
CAPTCHA
a system that confirms a user is a human and not a computer or automated system by asking questions that are easy for humans to answer but extremely difficult for computers to answerÂ
confidentiality
ensuring that only authorized users have access to sensitive data
information security
the methods used to protect data from unauthorized access
multi-factor authentication
authentication method that requires the user to provide at least two unique credentials
password-based authentication
the process of confirming a user’s identity by providing a username and password
password criteria
a policy or set of requirements for the creation of passwords that increases security
password management software
a program that generates and maintains strong passwords
personal identification number
a number used to verify an account or individual (PIN)
point of sale
a place at which customers pay for an item purchased (POS)
scam
a dishonest scheme
skimming
the illegal practice of stealing bank or credit card information by installing devices into bank account or credit card machine readers
smart card
a physical card containing an embedded memory chip supplied to a device in order to confirm a user’s identity
activity monitor
a Mac operating system tool that monitors computer activity, including memory, active processes, and applications
application
a program designed for users
background process
a process that runs without user interaction for running the computer
breach
an unauthorized break in security or protection
ciphertext
text that has been encrypted from plain text
cryptographic keys
data used to lock or unlock cryptographic functions
cryptography
practice of converting ordinary plain text into unintelligible text and vice-versa
decryption
reverting encrypted data into their original form
encryption
a method of converting information by scrambling data into secret code to hide the information's true meaning
multithreading
the ability of a central processing unit to provide multiple threads of execution concurrently
padlock
an image used in an address bar to indicate a secure site
secure coding
writing code to reduce security vulnerabilities
task manager
a Windows operating system tool that monitors computer activity, including memory, active processes, and applications
two-factor authentication
a security system that requires two distinct forms of identification in order to access an account