Java Games: Flashcards, matching, concentration, and word search.

MTA Mobility & Devices Session 3

AB
Intraneta local or restricted communications network, especially a private network - ie. Webpage that can only be viewed or used while inside a companies network
Extranetan intranet that can be partially accessed by authorized outside users, enabling businesses to exchange information over the Internet securely.
Microsoft Sharepointa browser-based collaboration and document management platform from Microsoft It allows groups to set up a centralized, password protected space for document sharing.
Host Based Firewallinstalled on each individual server that controls incoming and outgoing network traffic and determines whether to allow it into a particular device (i.e. the Microsoft firewall that comes with a Windows-based computer).
Network Based Firewallis a firewall that is built into the infrastructure of the cloud (i.e. Amazon’s firewall in AWS environments) or a virtual firewall service such as those offered by Cisco, VMware and Check Point.
Networking PortIn computer networking, port numbers are part of the addressing information used to identify the senders and receivers of messages.
Cloud ComputingComputing done where part of the computing is not done on your device
Office 365Cloud (SaaS) based Microsoft Applications including Word, Excel and PowerPoint
AuthenticationThe process of identifying an individual, usually based on a username and password.
Multifactor Authenticationis a security system that requires more than one method of authentication from independent categories of credentials to verify the user's identity for a login or other transaction.
Smart CardPocket sized card that has a chip inside of it. It it typically used for authentication.
Windows Rights Management Servicesis a Microsoft Windows security tool that provides persistent data protection by enforcing data access policies.
On-premisesWork is done inside your domain and not on the cloud.
Biometricsare unique physical characteristics, such as fingerprints, that can be used for automated recognition.
Strong passwordsa good password has 8 characters and includes both uppercase and lowercase letters, numbers and at least one special character. Do NOT use words.
Group Policesis a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to implement specific configurations for users and computers. Group Policy can also be used to define user, security and networking policies at the machine level.
Permissionsa level on which users can access resources (files, apps, folders, etc._
Rightsthe level to to which someone can customize their environment
Resulted Permissionsthe cumulative result of permissions assigned to for default groups or users
Smart Screen Filtera Microsoft filtering tool designed to detect and block suspicious and malicious sites, applications and files. The program checks the safety of websites and downloads and tracks malware and phishing attempts
Virusa piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
Wormis a standalone malware computer program that replicates itself in order to spread to other computers.
Trojan Horseis a type of malware that is often disguised as legitimate software.
RootKita collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.
Malwaremalicious software
Spywareis software that aims to gather information about a person or organization without their knowledge, that may send such information to another entity without the consumer's consent, or that asserts control over a device without the consumer's knowledge.
CookiesA small text file (up to 4KB) created by a website that is stored in the user's computer either temporarily for that session only or permanently on the hard disk (persistent cookie). Cookies provide a way for the website to recognize you and keep track of your preferences.
AdWaresoftware that automatically displays or downloads advertising material (often unwanted) when a user is online.
Windows Defenders malware protection that is included with and built into Windows 8 & 10

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities