click below
click below
Normal Size Small Size show me how
CIT EP B3U09
| English | Spanish |
|---|---|
| attack | (n, c) It is an attempt to get through computer security. |
| audit log | (n, c) It is a record of who has accessed a computer system and what actions they took. |
| authenticate | (v) It is to make sure that it is legitimate. |
| backdoor | (n, c) It is a hidden way to get by security in computers and programs, sometimes intentionally created. |
| bug | (n, c ) It is a flaw in a computer program. |
| firewall | (n, c) It is a program that restricts access on a network. |
| intruder | (n, c) It is a person or program that attempts to access a network or computer without permission. |
| keylogger | (n, c) It is type of trojan virus that tracks what keystrokes are entered into a computer. |
| patch | (n, c) It is a piece of code that is used to fix a flaw in a computer program. |
| popup | (n, c) It is an advertisement that suddenly appears in a new window in an Internet browser. |
| protocol | (n, c) It is a set of rules that must be followed for the sake of security. |
| security | (n, u) It is a the state of being safe from attack. |