Chapter 30 Flashcards
Brute force attack
A cryptanalytic attack that can be used against my encrypted data
Browser hijacking
The modification of a web browser’s settings by malware
Hacking
Someone who seeks and exploits weaknesses in a computer system or computer network
Hardware firewall
Uses packet filtering to examine the header of a packet to determine its spruce and destination
Key logger
The action of tracking the keys struck on a keyboard
Private key
A class of algorithms for cryptography that use trivially related cryptographically keys
Public key
A cryptographic key that van be obtained and used by anyone to encrypt messages intended for a particular recipient
Repetitive strain injury
A condition in which the prolonged performance of repetitive actions cause pain or impairment
Secure sockets layer
Cryptographic protocols that provide security
Sniffer
A computer tool that captures network data in the form of low level packets
Spyware
Software that self installed on the computer,enabling information to be gatherer covertly about a person’s Internet use
Strong password
Password strength is measured by the effectiveness of a password
Transport layer security
Cryptographic protocols that provide communication security over the Internet