click below
click below
Normal Size Small Size show me how
AP CompSci Test U8
AP CompSci Test
Term | Definition |
---|---|
Metadata | Information about the context of the data. (the who, the what, the where, the when of something) |
Public Key Encryption | Sender uses a public key that anyone can know to encrypt/code the message Recipient has a private key to decrypt/read the message |
Symmetric Encryption | Sender and receiver have the same secret key used to encrypt & decrypt. |
Keylogging | A keyboard recording activity using a keylogger which is designed to capture all keystrokes of a computer. |
Phishing | When an attacker attempts to exploit a user in order to bypass security measures |
Malware | Software used to perform malicious actions. Virus, worm, trojan horses, ransomware are all examples of malware. Can spy on online activities, steal passwords and files, or use your system to attack others. |
Virus/Worm/Trojan Horse | Different types of malware. Virus is an executable program that gets installed and harms the user and their computer, also can spread itself to other computers. |
Ransomware | Encrypts all of your files, locking you out of your files, then the cyberattacker demands money to recover the ransom. |
Spyware | Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. |
Multifactor (or 2-factor) authentication | When a user needs to input 2 or more athentifications to log-in |
Bot (or Botnet) | A digital army, used to attack and take down a website. |
Distributed Denial of Service (DDoS) attack | Hackers overwhelm a website with many requests, distributed when it comes from many different computers at once. |
Rogue Access point | An access point installed on a network without the network owner's permission |