1/10
Key terms and definitions
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Social Engineering
tricking a person into giving up sensitive information or access to sensitive data.
Penetration Testing
professional and ethical hacking used to spot vulnerabilities and patch them before attackers can take advantage of it.
Topology
defines how devices connect with each other (physical) and how that data flows (logical)
Network Operating Systems (NOS)
specialised software used to control how devices and users can interact over a network whether through file sharing, web and app services and other network resources.
Firewalls
security systems designed to monitor incoming and outgoing network traffic
Two factor authentication
verifying through a secondary method to prove a user is legitimate and increase security
Data Encryption
data converted into a coded format that can only be understood and decoded by authorised devices or applications
Protocols
industry standard rules and layouts that define how devices, software, and applications communicate reliably
Standards
industry standard rules and guidelines to ensure compatibility between devices from different manufacturers
Domain Name System (DNS)
converts human readable names, like websites into IP addresses that computers can understand and process.
Data packets
small chunks of data sent over a network and then reassembled at the destination