Unit 1 Lesson 1 Flashcards
Digital Footprint
the trail that you leave behind when you engage in online experiences
Network Security Cloud Lab
a virtual machine or simulated computer that runs on a host computer
Virtual Machine
an emulation of a computer system
Crack
to guess or discover information, especially a password
Python script
a collection of Python code or commands that perform some function
Brute force attack
an attempt to discover information, especially passwords, through trial and error. Attackers try as many passwords or phrases as possible hoping one of the guesses is correct
Dictionary attack
a systematic attempt to crack a password testing with words and phrases found in online dictionaries
Encryption
a process that converts human-readable text or data into a coded form. It is usually used to protect data from being easily seen or accessed. To encrypt means to do the conversion
Algorithm
a set of steps to accomplish a task. An algorithm can be expressed in many kinds of notation, such as natural language, pseudocode, and flowcharts. Algorithms are essential to the way computers process data, because they contain the specific instructions for what a computer or program does
Authorize
to give permission, for example, in order to access information
Authenticate
to confirm your identity using knowledge known only to you or information interpreted by you
CAPTCHA
a system that can distinguish between a human and an automated program
Social media
websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network
Spam
irrelevant or inappropriate messaging sent through email to a large number of recipients; also known as junk mail
Phishing
practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers
Phisher
the person sending the phishing attempts
Email source
the email address from which the email was sent
Top-level domain
the last segment of a web address; it follows immediately after the last “dot” symbol (.com, .net, .org, .gov)
Malware
software that is intended to do harm or damage
Social engineering
gaining access to buildings, systems, or data by exploiting human psychology rather than by breaking in or using technical hacking techniques
Cyberteam
a team of individuals working together to investigate cyber events and anomalies
Team norms
guidelines that team members develop in order to be followed when working together