Java Games: Flashcards, matching, concentration, and word search.

209 IT

AB
ACLA checklist permitting or denying users access to and from resources.
Active X ControlsTechnology developed by Microsoft that allows software components to interact with one another in networked environments, like the Internet.
Back DoorA hole left in software by its designer for them to be able to get into it to maintain it; sometimes used by crackers to maliciously break into the software to cause harm.
Content FilteringA security feature that blocks certain websites because of the type of information displayed on those pages.
CyberterrorismThe process of using the Internet and technology to cause lphysical, real wod harm by political or religious organizations.
Digital CertificateIdentification issued by a trusted third party that verifies the identification and that it belongs to the company or individual that it claims to be from.
DoSDenial of Service; attack that floods a network with requests so that it slows or completely interupts network traffic.
Encryption AlgorithmCode used to turn ordinary data into a scrambled form that makes it hard for someone to decode.
ExploitA way to take advantage of some vulnerability of computer software or hardware such as bugs or glitches.
HashingAn encryption technique that uses keys to store and retrieve data.
HoaxesEmail sent to intentionally intimidate the receiver.
Intrusion Detection Systemsused to detect malicious traffic and computer usage on a network that a firewall cannot detect.
KerberosAuthentication system that uses a master ticket that is fgiven out by the Key Distribution Center and tehn service tickets are issued if additional resources are needed.
Meta DataInformation about information.
PhishingEmail scam intended to trick a user by sending them emails that look like they're from reputable sources and asking for personal information like passwords and credit card information to use for fraudulent purposes.
PingA troubleshooting tool used to verify connectivity to network resources.
RAIDUsing multiple hard drives to improve performance or for fault tolerance.
SnifferA progrma that watches packets going across a network.
Social EngineeringIllegally entering computer systems by getting people to reveal IDs, passwords, and aother confidential information.
Software ExploitationPrograms that are written to go after software weaknesses over a network or the Internet.
SpoofingSimilar to phishig; making something appear to be something else by deception.
TCP/IP HijackigInserting commands into active communication between two machines on a network but looking like the communication is coming from one of the authenticated users.
ThreatForewarning of an attack on a computer system.
TokensSecurity device given to a network user either physically, like a credit card, or in software.
VulnerabilityA weakness in software of hardware that may results in the system, data or applications being at risk.


Teacher
Northampton County High School
Conway, NC

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities