Unit 1.2 Cybersecurity

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall with Kai
GameKnowt Play
New
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/45

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

46 Terms

1
New cards

network topology

the arrangement of the various elements (computers, routers, switches, etc) of a network

2
New cards

LAN

A small local area network of computers and devices

3
New cards

service

a) a _____ can be a specific application or function such as email, chat, etc . b) a _____ can refer to a specific part of an application, such as transmitting the data of a web page 

4
New cards

Short message service (SMS)

real-time chats between individuals and groups of people (text messages)

5
New cards

image-sharing

sharing images in real time (instagram, snapchat)

6
New cards

streaming media services

a one-way service that continuously sends data (netflix, hulu)

7
New cards

internet telephony

talk over the internet to any PC equipped to receive calls (Skype, Facetime)

8
New cards

email source

send electronic messages over the internet (Gmail, YahooMail)

9
New cards

forums

Visit an online area to read and post topics to interest; can be anonymous (Nextdoor)

10
New cards

internet relay chat

real-time communication in a shared interface (a chatroom in SecondLife)

11
New cards

mailing lists

a group of users that share common interests, often through email (LISTSERV)

12
New cards

file transfer protocol (FTP)

transfer data files (downloads and uploads)

13
New cards

vulnerability

in cybersecurity terms, a vulnerability is a weakness in a system that allows an attacker to gain unauthorized access

14
New cards

virus

software that is spread by people, specifically user actions, usually through emails, websites, and chats. A virus infects your computer, causing a wide variety of problems

15
New cards

worm

similar to a virus except that a worm does not need a human to spread, rather it can rpelicate on its own to infect other comuters

16
New cards

backdoor

malicious software that bypasses the normal, secure, or restricted access

17
New cards

spyware

software that secretly collects information about you. It usually resides on a website or in a service such as your email program

18
New cards

trojan horse

a malicious program disguised as legitimate software. Users intentionally install a Trojan horse, thinking they are installing valid software.

19
New cards

adware

advertising software that can automatically download files or link to websites. It is often unasked-for and can contain malware

20
New cards

pop-up

a new dialog box that appears on your screen, sometimes with you requesting it.

21
New cards

operating system (OS)

Software that supports a computer’s basic functioning. Every general purpose computer has an operating system.

22
New cards

updates

Enhancements, improvements, and problem fixes for software.

23
New cards

firewall

Software that can stop malware from entering a network, computer, or device.

24
New cards

server

A computer shared by multiple users across a network. It usually contains resources such as files, computer applications, or large databases.

25
New cards

router

A network device that controls and filters data between networks, either wired or wireless. It is a specific type of "gateway", a device that acts as a gate between two networks.

26
New cards

protocol

An agreed-upon method for communication

27
New cards

port

A way for a computer to identify specific programs and manage their activity. In an IP addresses, the port appears after a colon at the end of the address such as :21, :80, and :443.

28
New cards

web server

A computer that delivers files forming web pages across a network to requesting clients.

29
New cards

HTTP

Hyper-text transfer protocol; the rules of communication that web sites use to exchange data.

30
New cards

encryption

A process that converts human-readable text or data into a coded from. It is usually used to protect data from being easily seen or accessed. To encrypt means to do the conversion.

31
New cards

log files

A file that contains an official record of activities that occur on a computer

32
New cards

antivirus

Software that runs on your computer, looking for many different types of malware from many different sources.

33
New cards

file

All data on a computer Data is stored in many different types of files

34
New cards

folder

A special kind of file that contains other files.

35
New cards

process

An application file that is currently executing (also called running) in the operating system.

36
New cards

database

A collection of files.

37
New cards

web page

An HTML file

38
New cards

zip file

A file that contains a collection of other files

39
New cards

encryption

A process that converts human-readable text or data into a coded from. It is usually used to protect data from being easily seen or accessed. To encrypt means to do the conversion.

40
New cards

wildcard

A special character that can represent one or more characters. The asterisk (*) wildcard can stand from many letters, numbers, or symbols

41
New cards

RAM

Random Access Memory, or RAM, stores data that is in use

42
New cards

environment variable

A value that can change depending on the environment in which a processes runs

43
New cards

process tree

A process tree is a representation of all running processes shown in a tree-like structure with parent and child processes forming the branches of the tree.

44
New cards

URL

The acronym for “Uniform Resource Locator”. The systematic way to find specific web addresses and web pages. A URL is composed of characters that contain information about where to locate a resource over the internet.

45
New cards

cookie

small text-based bits of information about your browser that a web saves

46
New cards

site certificate

A site certificate, also called a security certificate, is a small data file that is validated by a “certificate authority”. It allows an organization to have a secure website.