Java Games: Flashcards, matching, concentration, and word search.

108 Security

AB
AttributeClassifications associated with files that determine how the files can be viewed or edited.
AuthenticationThe process of verifying the identity of someone logging onto a network.
BiometricsA method of identifying a person by using biological methods such as fingerprints, retinal scans, and voice.
CookieInformation placed on a user's hard drive to track things such as shopping habits and preferences.
CrackerA person who breaks into computer systems or software with out permission and with intent to do harm.
CryptographyThe study of encryption.
DecryptionThe process of converting scrambled data back into the original form so that it can be understood by the receiver.
Digital CertificateIdentification issued by a trusted third party.
EncryptionThe process fo turning ordinary data into a coded message.
FirewallSoftware or hardware used as a security device to prevent unauthorized users or information from transferring information to or from the network.
Full ControlPermission that can modify, take ownership of, and assign other users permission to the file or folder.
HackerA programmer.
HandshakeThe process of network devices communicating to synchronize transmission with each other.
IntranetA computer network that is privately maintained by an organization so that authorized persons can access it.
KeyloggerA program that records everything typed in on a keyboard.
List Contentspermission that allows the user to view files and folders but not modify it or the attributes or even view the attributes.
MacroVirus that acts upon spreadsheet or word processor application.
MalwareMalicious software that distrubs normal computer operations or gathers personal data to give it out to unauthorized people over the Internet.
ModifyPermission of files or folders to be able to change or delete.
PatchSmall program that is written to fix or update another program.
PingA troubleshooting tool used to verify connectivity to network resources.
RaidUsing multiple hard drives to improve performance or for fault tolerance.
Service PackSoftware patch that is installed to an application or operating system.
Social Engineeringillegally entering computer systems by getting people to reveal IDs, paswords, and other confidential information.
SpamJunk, unsolicited e-mail.
ThreatForewarning of an attack on a computer system.
Trojan Horseprogram that presents itself as something legitimate but may have destructive intents.
VirusProgram designed to copy itself into other programs stored on a computer.
Virus Definition FilesContain patterns to identify viruses and must be kept up to date in order to identify newly created viruses...
VulnerabilityA weakness in software or hardware that may results in the system, data or applications being at risk.
WormA malicious program that replicates itself to fill a hard drive or storage space.
WritePermission to a file or folder to add files or make changes to them but not delete them.


Teacher
Northampton County High School
Conway, NC

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities