Java Games: Flashcards, matching, concentration, and word search.

Security Center

AB
Anti-virus softwarecan identify and eliminate viruses from your computer by scanning your computer to look for characteristics of viruses and suspicious behavior from your programs
Cachea location on your hard drive where Web information is temporarily stored. Storing this information, such as persistent graphics and logos, allows your browser to quickly re-load Web pages. Rather than waiting for already-viewed items to be downloaded to your computer from the Web, your browser displays the items that it previously stored
Cookiesa location on your hard drive where Web information is temporarily stored. Storing this information, such as persistent graphics and logos, allows your browser to quickly re-load Web pages. Rather than waiting for already-viewed items to be downloaded to your computer from the Web, your browser displays the items that it previously stored.may contain your user name or ID, details about how you navigated through the site, and even some account information for the Web site's quick reference. This information is encrypted and cannot be read by anyone but the Web server for which it was intended.
EncryptionEncryption is a mathematical process that transforms a message sent to you over the Internet so that its meaning is concealed from other people. It translates text into a scrambled code and then, when that data reaches its destination (your computer), it is converted back to its original text form so that you can read it.
Secure Sockets Layerused to validate the identity of sites and encrypt information so that your personal information is more secure as it travels through the Internet
Firewallscontrols traffic between a computer and a network to help ensure that only legitimate traffic takes place. Also disguises and hides the presence of computers behind it, making it more difficult for potential intruders to find and attack them.
Pop-up blockerssoftware programs that keep advertisements and new windows from popping up on your computer screen.
Wireless Networksallows you to connect to the Internet without a physical connection using broadcast signals received by your computer (similar to a radio broadcast).
Wardrivingpurposeful attempt to hijack a wireless signal
Wired Equivalent Privacy (WEP) keyan encryption system that scrambles data sent wirelessly
Identity theftstealing a person's personal or financial data to commit fraud
Phishingan attempt to steal personal or financial information. It usually starts with an e-mail asking for sensitive information, such as your user ID or user name, your password, or your account information
PharmingAlso known as Phishing
Spywareused relatively harmlessly by advertisers who track your Internet usage and then use that data to target specific ads to you. Or, more dangerously, it can be used by hackers who might monitor your chat sessions, capture keystrokes to figure out the personal information you enter (password or account number), or change your Web browser settings
Viruscomputer code that infects your computer when you take a certain action, such as double clicking on an e-mail attachment
WormsA stand-alone programs. They do not embed themselves into another piece of software, but spread by duplicating themselves without any intervention from you.
TrojanA stand-alone program that spreads by masquerading as a harmless file or program and tricking the user into installing it on his or her machine
Root kitssets of tools used by an intruder to gain and maintain access to your computer. They contain a variety of applications to help intruders hack into your system and intercept data from the network and your keyboard

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities