1/45
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Asymmetric Encryption
Encryption where different keys are used for encryption and decryption.
Bandwidth
The amount of data that can be transmitted in a fixed amount of time, usually measured in megabits per second (Mbps).
Caesar Cipher
A simple encryption technique that shifts letters in the alphabet by a fixed number of places.
Cipher
A method for encrypting or decrypting data.
Computing Device
A machine that can run a program (e.g., smartphones, laptops, servers).
Computing Innovation
An innovation that includes a program as an integral part of its functionality.
Computing Network
A group of connected devices that can send and receive data.
Computing System
A group of computing devices and programs working together for a purpose.
Cracking Encryption
Attempting to decode or break a secure encryption.
Datastream
Data sent in packets over a network.
DDoS (Distributed Denial of Service)
An attack where multiple systems overwhelm a network or server with traffic.
Decryption
The process of converting encrypted data back into its original form.
Digital Divide
The gap between those who have access to technology and the Internet and those who do not.
Domain Name
A human-readable address for accessing websites (e.g., www.google.com).
DNS (Domain Name System)
The system that translates domain names into IP addresses.
Encryption
The process of encoding data to keep it secure from unauthorized access.
Fault Tolerance
The ability of a system to continue functioning when part of it fails.
HTTP (HyperText Transfer Protocol)
Protocol for transferring web pages.
HTTPS
A secure version of HTTP using encryption.
Internet
A global network of interconnected devices using standard communication protocols.
IP (Internet Protocol)
A protocol for sending data across networks.
IP Address
A unique identifier for a device on a network.
Keylogging
Recording the keystrokes of a user, often maliciously.
Malware
Malicious software designed to damage or disrupt systems.
Man in the Middle
An attack where a third party intercepts communication between two devices.
Multifactor Authentication
A security measure requiring two or more verification methods.
Packet
A unit of data transmitted over a network.
Packet Metadata
Information about a packet used for routing and reassembly.
Password Attacks/Theft
Methods to gain unauthorized access to passwords.
Path
A sequence of connections between devices on a network.
Phishing Attacks
Attempts to trick users into providing sensitive information.
Private Key Encryption
key that is kept secret and used to decrypt encrypted data. It is unique to a given entity.
Public Key Encryption
Encryption using different keys for encryption (public) and decryption (private).
Ransomware
Malware that locks a user’s data until a ransom is paid.
Redundancy
Duplication of critical components to increase reliability.
Rogue Access Point
An unauthorized wireless access point.
Router
A device that directs packets to their destination.
Scalability
The ability of a system to handle increasing amounts of work.
Social Engineering
Manipulating people into revealing confidential information.
SSL (Secure Sockets Layer)
A standard for encrypting data between web servers and browsers.
Symmetric Encryption
Encryption using the same key for both encryption and decryption.
TCP (Transmission Control Protocol)
A protocol for reliable, ordered delivery of packets.
TLS (Transport Layer Security)
An updated version of SSL.
UDP (User Datagram Protocol)
A protocol for fast but unreliable data transmission.
World Wide Web
A system of linked pages, programs, and files accessed via the Internet.
Zero Day Exploits
Security vulnerabilities discovered and exploited before developers can fix them.