1/54
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Digital Footprint
Information or data left behind by when using social media
Phishing
Cyber crime attempting to trick a user into providing sensitive data by posing as a
legitimate company
DDoS
Type of attack that overwhelms a server with traffic that prevents others from accessing
Malware
Any type of software designed to harm a computer or network
Ransomware
Malware that prevents users from accessing their files until a ransom is paid
Internet of Things
Everyday “smart” objects that are connected to the internet
(CIA)Confidentiality
Restrict access to sensitive information
(CIA)Integrity
Protects information from being tampered with or removed
(CIA)Availability
Allows quick and easy access to the information
“Black Hat Hacker”
“White Hat” Hacker”
“Grey Hat” Hacker
Cryptography
Encrypts information so that only authorized people can read/access it
Encryption
Converts information into an unreadable format
Decryption
Converts encrypted information back to a readable format
Plaintext
The information before encryption
Cipher
an algorithm that gives the process for performing encryption
Ciphertext
The coded information after plaintext has been encrypted
Key
Tells the user how the cipher encrypted the data. Needed for decryption
Caesar Cipher
A simple substitution cipher that replaces each plain text letter with a different letter in sequence based on shift number (key)
Vigenere Cipher
A more complex substitution cipher that uses a keyword where each letter is a different caesar key
Brute Force
A method of cracking encryption using trial and error to check every possibility
Frequency Analysis
A method of cracking encryption that looks for letters that occur more often
Operating System (OS)
software that manages all hardware and applications of a computer
Firmware
Software embedded in a device that controls very basic functions (starting up)
Hardware
The physical components of a computer
Software
Set of instructions that tells a computer what to do (applications, system processes)
Antivirus Software
Specific software that scans for and removes malicious software
Proxy Settings
Allows a “middle” and privacy between the user and the internet for increased security
and privacy
Private Browsing
Does not save to history or cache
Administrator account
highest level user account, can do everything including create new users
Guest Account
lowest level user account, can’t make any changes and software in their system are as secure as possible.
Binary
The language of computers, uses only zeros and ones
Bits
A single digit in the binary number system, smallest unit of storage
IP Address
Internet Protocol Address, every device on the internet has a unique one
Routing
Sending data between two computers on the internet determining its path
Packets
Unit of data that is sent over a network, usually to break large data into smaller parts
Motherboard
Circuit board that connects all of the components of a computer
Processor (CPU)
Central processing unit that accepts and executes instructions
Memory (RAM)
Random access memory that temporarily stores information needed right away
Storage (Hard Drive/SSD)
Stores and retrieves data
Input device
Peripheral devices connected to a computer to provide data and control signals
Driver
files that allow a device to communicate with the computer’s operating system
Network Ports
location where information is sent from one computer to another
Data
a collection of raw numbers or data points
Information
data that is organized or structured to give it context or meaning
Knowledge
information that is analyzed to gain additional insight
Penetration Testing
“white-hat” legal hacking at the request of an organization to test their system for vulnerabilities and help repair them
SQL
a query language used to retrieve data from a database management system
SQL Injection
an attack where an input is used to run malicious SQL statements
Physical Vulnerabilities
a weakness in the hardware of physical environment of a network
Human Vulnerabilities
accidents made by people in a network, either intentional or accidental
Software Vulnerabilities
any outdated or unsecure software within a network
Password Security
avoid common words, use a mix of characters, and have different passwords