Terminology Flashcards

1
Q

Decryption

A

Unlocking a protected document by entering a correct password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption

A

Protecting a document with a password that only the owner should have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Tags

A

What is used to code in HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Gateway

A

Keeps you from entering or exiting/allow or not allow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall

A
  • Hardware or software that stops malware from accessing your network
  • A gateway that prevents or allows information from reaching the internet
  • Can alert you when malware connects to your network
  • Can use it to block certain words or programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

Software that is intended to access your sensitive information like banking details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Grid computing

A

When multiple computers are used to solve a singular problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DDos Attack

A
  • Distributed Denial of service Attack
  • A total attack that stops all people from using the service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DoS

A
  • Denial of service Attack
  • A service so slow that it no one can use it completely
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bot/Zombie

A
  • When the hacker takes over the computer to use it for their own personal gain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NIC

A
  • Network Interface Controller
  • Hardware component that allows your computer to connect to a wired network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Torenting

A

A method for people to download books, movies, or audio files illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VPN

A
  • Virtual Private Network
  • Allows you to change your location and stay anonymous on the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TOR

A
  • Browser that allows you to access he dark web
  • Use a VPN to stay anonymous
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Router

A
  • Device that allows you to connect to the internet wirelessly

ADSL or Fibre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Modem

A
  • Device that takes the ADSL/Fibre connection and makes it understandable for the router
  • Allows the router to connect to the ADSL/Fibre
16
Q

ADSL

A
  • Asymmetrical Digital Subscriber Line
  • A very old method of connecting to the internet
  • Made from copper
17
Q

Fibre

A
  • A very fast way of connecting to the internet using light
  • Pulses information that bounces the information off the fibre pieces in the cable
18
Q

Worm

A

A virus associated with a network

19
Q

Client vs Server

A
  • Client is a device or program tht requires services via the web
  • Requests the server for content or service function
  • A server is a device or program that responds to the requests of clients by providing them services

clients: desktops, laptops, web browser server: file/web server

20
Q

Types of Wired connections

A
  • ADSL(Internet)
  • Fibre(Internet/Network)
  • UTP(Network)
  • STP(Network/PoE)
21
Q

PoE

A
  • Power over Ethernet
  • When your device can get its power from an Ethernet cable
22
Q

Wireless connections

A
  • Wifi
  • Bluetooth
  • 3G/4G/5G (G=Generation)
23
Q

Phishing

A
  • Stealing user data like login info
  • Tricks users by pretending to be a trsuted entity into confirming information or replying to an email through emails, text messages, or instant messages
24
Other types of Phishing
* SMSishing- Phishing through SMS * Whaling- When very importnant people ("White-collar people") are trucked into giving personal details or sensitive information because hackers masquerade as legitimate entities
25
Computer Mal practices
* Pharming- Redirecting users to a fraudulent website pretending to be a legitimate one to get users personal information * Spoofing- When the header of an email is changed to conceil the indentity of the hacker
26
CPU
* Intel, AMD * Retrieves information and executes instructions
27
GPU
* AMD, Asus, MSI * Executes graphical instructions
28
Heat sink
* Absorbs the heat from a computer, specifically the CPU if placed over it
29
VGA port
* Used to connect a screen to a desktop or an external screen to a laptop * Only send images, if you want sound you have to use an Auxillary cable needs to be attached
30
HDMI
* Can send both sound and videos without an aux * Can be faster and better image
31
Computer Fan
* Keeps the internal temperature of the computer low * Can be placed on top of CPU or on the PSU
32
PSU
* Power Supply Unit * Supplies the computer with electricity
33
Social Engineering
* Any malicious activity that is accomplished through human interaction where people are manipulated psychologically into making mistakes and giving sensitive info