Unit 1 Lesson 1 Flashcards
Digital Footprint
the trail that you leave behind when you engage in online experiences
Network Security Cloud Lab
a virtual machine or simulated computer that runs on a host computer
Virtual Machine
an emulation of a computer system
Crack
to guess or discover information, especially a password
Python script
a collection of Python code or commands that perform some function
Brute force attack
an attempt to discover information, especially passwords, through trial and error. Attackers try as many passwords or phrases as possible hoping one of the guesses is correct
Dictionary attack
a systematic attempt to crack a password testing with words and phrases found in online dictionaries
Encryption
a process that converts human-readable text or data into a coded form. It is usually used to protect data from being easily seen or accessed. To encrypt means to do the conversion
Algorithm
a set of steps to accomplish a task. An algorithm can be expressed in many kinds of notation, such as natural language, pseudocode, and flowcharts. Algorithms are essential to the way computers process data, because they contain the specific instructions for what a computer or program does
Authorize
to give permission, for example, in order to access information
Authenticate
to confirm your identity using knowledge known only to you or information interpreted by you
CAPTCHA
a system that can distinguish between a human and an automated program
Social media
websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network
Spam
irrelevant or inappropriate messaging sent through email to a large number of recipients; also known as junk mail
Phishing
practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers