Loading [MathJax]/jax/output/HTML-CSS/fonts/TeX/fontdata.js

flash cards for computer science end of unit quiz

Descripción

Fichas sobre flash cards for computer science end of unit quiz, creado por Sam Dalby el 18/06/2021.
Sam Dalby
Fichas por Sam Dalby, actualizado hace más de 1 año
Sam Dalby
Creado por Sam Dalby hace casi 4 años
34
0
1 2 3 4 5 (1)

Resumen del Recurso

Pregunta Respuesta
Hacking unauthorized access to computer material
Phishing sending a fake email or message pretending to be from a bank or organisation, which tricks users into trying to log on to a fake website, stealing the login details
Malware Malicious software, designed to cause harm
Ransomware malware that encrypts users files and demands a ransom to decrypt them
Botnet a network of computers which contain malware allowing them to be controlled by a hacker
Key logger malware that records every keypress and sends it to a hacker for analysis
Security software often called antivirus software even though it deals with more than just viruses, scans computers for known malware and removes it. Must be kept up to date with the latest malware definitions.
White hat hacking hacking that is done with the authorisation of the company being hacked. The hacker produces a report of all the vulnerabilities they found, so that the company can fix them.
Grey hat hacking hacking done without the authorisation of the company, but with good intentions, often the company will be informed of how the hacker was able to gain access
Backups keeping a copy of important data on a different system, so that it can be restored if the original is damaged
Cipher a method of encrypting text
Plaintext the unencrypted data
Ciphertext the encrypted data
Key some information needed to encrypt/decrypt the data
Crack to read encrypted data without being given the key beforehand
Brute force crack a cipher by trying every possible key until successful
Statistical attack crack a cipher by using statistics and estimates of the most likely values
Caesar cipher a simple cipher, where each letter is shifted a number of places up the alphabet
Substitution cipher a simple cipher where each letter is replaced by a different letter
Mostrar resumen completo Ocultar resumen completo

0 comentarios

There are no comments, be the first and leave one below:

Similar

Presidentes deMéxico (1964-2018)
Raúl Fox
Freud: Esquema del Psicoánalisis
Cesar_Adolfo
GEOGRAFIA
ROSA MARIA ARRIAGA
AUTORES-LIBROS
ROSA MARIA ARRIAGA
ACIDOS Y BASE
Mariela Monroy
Las Alteraciones
mariajesus camino
Análisis de una Pintura
Sandra Ortega L.
USO DE LA FUERZA Y ARMAS NO LETALES EN LA POLICÍA NACIONAL
ALVARO ENRIQUE MORENO MORENO
VIOLENCIA Y DELINCUENCIA
Edgar Sarzosa