1/9
big topic 5
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Crowdsourcing
Getting help from a big group of people, usually through the internet, to work on something together. Ex- Wikipedia
Personally identifiable information (PII)
Information that can be used to figure out who you are. Examples include your name, Social Security number, and address.
Multi factor authentication
Using two or more steps to log in to keep your account extra safe.
Encryption
Scrambling information so only the right person can understand it. (preventing unauthorized access)
Decryption
Unlocking secret coded information so you can read it normally.
Computer virus
A bad program that spreads and hurts your computer or steals data. Ex- email virus
Malware
Bad software intended to damage a computing system or to take partial control over its operation.
Phishing
A trick to steal your information by pretending to be someone you trust. Ex- fake email from a “bank”
Keylogging
A spy tool that tracks everything you type on your keyboard. (recording every keystroke)
Rogue access point
A wireless access point that gives unauthorized access to secure networks. Ex- Hacker sets up fake wifi at airport