Terminology Flashcards

1
Q

Decryption

A

Unlocking a protected document by entering a correct password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption

A

Protecting a document with a password that only the owner should have

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Tags

A

What is used to code in HTML

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Gateway

A

Keeps you from entering or exiting/allow or not allow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall

A
  • Hardware or software that stops malware from accessing your network
  • A gateway that prevents or allows information from reaching the internet
  • Can alert you when malware connects to your network
  • Can use it to block certain words or programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware

A

Software that is intended to access your sensitive information like banking details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Grid computing

A

When multiple computers are used to solve a singular problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DDos Attack

A
  • Distributed Denial of service Attack
  • A total attack that stops all people from using the service
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DoS

A
  • Denial of service Attack
  • A service so slow that it no one can use it completely
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Bot/Zombie

A
  • When the hacker takes over the computer to use it for their own personal gain
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NIC

A
  • Network Interface Controller
  • Hardware component that allows your computer to connect to a wired network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Torenting

A

A method for people to download books, movies, or audio files illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

VPN

A
  • Virtual Private Network
  • Allows you to change your location and stay anonymous on the internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TOR

A
  • Browser that allows you to access he dark web
  • Use a VPN to stay anonymous
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Router

A
  • Device that allows you to connect to the internet wirelessly

ADSL or Fibre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Modem

A
  • Device that takes the ADSL/Fibre connection and makes it understandable for the router
  • Allows the router to connect to the ADSL/Fibre
16
Q

ADSL

A
  • Asymmetrical Digital Subscriber Line
  • A very old method of connecting to the internet
  • Made from copper
17
Q

Fibre

A
  • A very fast way of connecting to the internet using light
  • Pulses information that bounces the information off the fibre pieces in the cable
18
Q

Worm

A

A virus associated with a network

19
Q

Client vs Server

A
  • Client is a device or program tht requires services via the web
  • Requests the server for content or service function
  • A server is a device or program that responds to the requests of clients by providing them services

clients: desktops, laptops, web browser server: file/web server

20
Q

Types of Wired connections

A
  • ADSL(Internet)
  • Fibre(Internet/Network)
  • UTP(Network)
  • STP(Network/PoE)
21
Q

PoE

A
  • Power over Ethernet
  • When your device can get its power from an Ethernet cable
22
Q

Wireless connections

A
  • Wifi
  • Bluetooth
  • 3G/4G/5G (G=Generation)
23
Q

Phishing

A
  • Stealing user data like login info
  • Tricks users by pretending to be a trsuted entity into confirming information or replying to an email through emails, text messages, or instant messages
24
Q

Other types of Phishing

A
  • SMSishing- Phishing through SMS
  • Whaling- When very importnant people (“White-collar people”) are trucked into giving personal details or sensitive information because hackers masquerade as legitimate entities
25
Q

Computer Mal practices

A
  • Pharming- Redirecting users to a fraudulent website pretending to be a legitimate one to get users personal information
  • Spoofing- When the header of an email is changed to conceil the indentity of the hacker
26
Q

CPU

A
  • Intel, AMD
  • Retrieves information and executes instructions
27
Q

GPU

A
  • AMD, Asus, MSI
  • Executes graphical instructions
28
Q

Heat sink

A
  • Absorbs the heat from a computer, specifically the CPU if placed over it
29
Q

VGA port

A
  • Used to connect a screen to a desktop or an external screen to a laptop
  • Only send images, if you want sound you have to use an Auxillary cable needs to be attached
30
Q

HDMI

A
  • Can send both sound and videos without an aux
  • Can be faster and better image
31
Q

Computer Fan

A
  • Keeps the internal temperature of the computer low
  • Can be placed on top of CPU or on the PSU
32
Q

PSU

A
  • Power Supply Unit
  • Supplies the computer with electricity
33
Q

Social Engineering

A
  • Any malicious activity that is accomplished through human interaction where people are manipulated psychologically into making mistakes and giving sensitive info