Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

ODW 8.2

Our Digital World 8.2

TermDefinition
encryption The process of using a key to convert readable information into unreadable information to prevent unauthorized access or usage.
public key A code key used in encryption. Creates an encrypted message that is decrypted by a private key.
private key A code key used in encryption that is known to only one or both parties when exchanging secure communications.
public key encryption A system of encrypting and decrypting data using a public key and private key combination.
Wi-Fi Protected Access (WPA) An encryption standard used to protect data sent across a wireless network. Designed by the Wi-Fi Alliance to overcome the security limitations of Wired Equivalent Privacy (WEP).
Wired Equivalent Privacy (WEP) An encryption standard used to protect data sent across a wireless network. An older and less secure technology than Wi-Fi Protected Access (WPA).
Wi-Fi Protected Access 2 (WPA2) A stronger, more complex encryption standard than WPA. WPA2 became mandatory in 2006 for all new equipment certified by the Wi-Fi Alliance.
malware Collectively, damaging computer programs such as viruses and spyware, which can do anything from displaying pop-up window advertisements to destroying your data or tracking your online activities.
spam Mass emails sent to those who haven’t requested them, usually for the purpose of advertising or fraud.
virus A type of computer program that is placed on your computer without your knowledge. The key characteristic of a virus is that it can reproduce itself and spread from computer to computer by attaching itself to another, seemingly innocent, file.
worm A self-replicating computer program with the ability to send out copies of itself to every computer on a network. Worms are usually designed to damage the network, in many cases by simply clogging up the network’s bandwidth and slowing its performance.
Trojan horse Malware that masquerades as a useful program. When you run the seemingly useful program, you let this type of malware into your system. It opens a “back door” through which hackers can access your computer.
macro virus A form of virus that infects the data files of commonly used applications such as word processors and spreadsheets.
logic bomb virus A piece of code that is placed in a software system to set off a series of potentially damaging events if certain conditions are met.
rootkit A set of programs or utilities designed to allow a hacker to control a victim computer’s hardware and software and permit a hacker to monitor the user’s actions.
botnet A group of computers that have been compromised (zombies or bots) so they can forward communications to a controlling computer.
zombie A computer compromised by malware that becomes part of a botnet and is used to damage or compromise other computers. Also called a bot.
spyware Software that tracks activities of a computer user without the user’s knowledge.
adware Software that is supported by advertising and is capable of downloading and installing spyware.
scareware A scam where an online warning or popup convinces a user that his or her computer or mobile device is infected with malware or has another problem that can be fixed by purchasing and downloading software, which may do nothing or install malware.
ransomware A scam where a user’s computer is locked or data encrypted with a message from the malware creator demanding payment to restore access or data.
Transport Layer Security (TLS) A protocol that protects data, such as credit card numbers as they are being transmitted between a customer and online vendor or payment company.
Secure Socket Layer (SSL) A cryptographic protocol that is required for creating Transport Layer Security (TLS).
cookie A small file stored on your computer by a web server to track information about you and your activities.
phishing The practice of sending email that appears to be from a legitimate organization in an attempt to convince the reader to reveal personal information.
spear-phishing A targeted phishing attack sent to individuals employed by certain companies for the purpose of obtaining trade secrets or other confidential information, leading to financial gain for the hacker.
Created by: softcrylic