ODW 8.2 Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Term | Definition |
encryption | The process of using a key to convert readable information into unreadable information to prevent unauthorized access or usage. |
public key | A code key used in encryption. Creates an encrypted message that is decrypted by a private key. |
private key | A code key used in encryption that is known to only one or both parties when exchanging secure communications. |
public key encryption | A system of encrypting and decrypting data using a public key and private key combination. |
Wi-Fi Protected Access (WPA) | An encryption standard used to protect data sent across a wireless network. Designed by the Wi-Fi Alliance to overcome the security limitations of Wired Equivalent Privacy (WEP). |
Wired Equivalent Privacy (WEP) | An encryption standard used to protect data sent across a wireless network. An older and less secure technology than Wi-Fi Protected Access (WPA). |
Wi-Fi Protected Access 2 (WPA2) | A stronger, more complex encryption standard than WPA. WPA2 became mandatory in 2006 for all new equipment certified by the Wi-Fi Alliance. |
malware | Collectively, damaging computer programs such as viruses and spyware, which can do anything from displaying pop-up window advertisements to destroying your data or tracking your online activities. |
spam | Mass emails sent to those who haven’t requested them, usually for the purpose of advertising or fraud. |
virus | A type of computer program that is placed on your computer without your knowledge. The key characteristic of a virus is that it can reproduce itself and spread from computer to computer by attaching itself to another, seemingly innocent, file. |
worm | A self-replicating computer program with the ability to send out copies of itself to every computer on a network. Worms are usually designed to damage the network, in many cases by simply clogging up the network’s bandwidth and slowing its performance. |
Trojan horse | Malware that masquerades as a useful program. When you run the seemingly useful program, you let this type of malware into your system. It opens a “back door” through which hackers can access your computer. |
macro virus | A form of virus that infects the data files of commonly used applications such as word processors and spreadsheets. |
logic bomb virus | A piece of code that is placed in a software system to set off a series of potentially damaging events if certain conditions are met. |
rootkit | A set of programs or utilities designed to allow a hacker to control a victim computer’s hardware and software and permit a hacker to monitor the user’s actions. |
botnet | A group of computers that have been compromised (zombies or bots) so they can forward communications to a controlling computer. |
zombie | A computer compromised by malware that becomes part of a botnet and is used to damage or compromise other computers. Also called a bot. |
spyware | Software that tracks activities of a computer user without the user’s knowledge. |
adware | Software that is supported by advertising and is capable of downloading and installing spyware. |
scareware | A scam where an online warning or popup convinces a user that his or her computer or mobile device is infected with malware or has another problem that can be fixed by purchasing and downloading software, which may do nothing or install malware. |
ransomware | A scam where a user’s computer is locked or data encrypted with a message from the malware creator demanding payment to restore access or data. |
Transport Layer Security (TLS) | A protocol that protects data, such as credit card numbers as they are being transmitted between a customer and online vendor or payment company. |
Secure Socket Layer (SSL) | A cryptographic protocol that is required for creating Transport Layer Security (TLS). |
cookie | A small file stored on your computer by a web server to track information about you and your activities. |
phishing | The practice of sending email that appears to be from a legitimate organization in an attempt to convince the reader to reveal personal information. |
spear-phishing | A targeted phishing attack sent to individuals employed by certain companies for the purpose of obtaining trade secrets or other confidential information, leading to financial gain for the hacker. |
Created by:
softcrylic
Popular Computers sets