1) encryption a) the process of decoding the data that was encrypted b) part of a computer system or network that is designed to block unauthorized access while permitting outward communication. c) measures taken to protect a computer or computer system against unauthorized access or attack d) the process of converting information or data into a code, especially to prevent unauthorized access. 2) decryption a) part of a computer system or network that is designed to block unauthorized access while permitting outward communication. b) the psychological manipulation of people into performing actions or divulging confidential information c) the process of decoding the data that was encrypted d) The standard security technology for establishing an encrypted link between a web server and a browser, typically indicated with a padlock icon in the address bar. 3) public-key encryption a) the psychological manipulation of people into performing actions or divulging confidential information b) an asymmetric encryption method that uses a public key (made available publicly) and a private key (available to owner only). c) measures taken to protect a computer or computer system against unauthorized access or attack d) The standard security technology for establishing an encrypted link between a web server and a browser, typically indicated with a padlock icon in the address bar. 4) Secure Sockets Layer (SSL) a) The standard security technology for establishing an encrypted link between a web server and a browser, typically indicated with a padlock icon in the address bar. b) Distributed Denial of Service - an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. c) an asymmetric encryption method that uses a public key (made available publicly) and a private key (available to owner only). d) The Internet is built around the notion of free and open access to information with no blocking, throttling, or paid prioritization. 5) cybersecurity a) measures taken to protect a computer or computer system against unauthorized access or attack b) an asymmetric encryption method that uses a public key (made available publicly) and a private key (available to owner only). c) software that is intended to damage or disable computers and computer systems. d) The standard security technology for establishing an encrypted link between a web server and a browser, typically indicated with a padlock icon in the address bar. 6) firewall a) the psychological manipulation of people into performing actions or divulging confidential information b) the process of converting information or data into a code, especially to prevent unauthorized access. c) part of a computer system or network that is designed to block unauthorized access while permitting outward communication. d) the process of decoding the data that was encrypted 7) DDoS Attack a) Distributed Denial of Service - an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources. b) part of a computer system or network that is designed to block unauthorized access while permitting outward communication. c) an asymmetric encryption method that uses a public key (made available publicly) and a private key (available to owner only). d) the process of decoding the data that was encrypted 8) social engineering a) the process of decoding the data that was encrypted b) the psychological manipulation of people into performing actions or divulging confidential information c) an asymmetric encryption method that uses a public key (made available publicly) and a private key (available to owner only). d) the process of converting information or data into a code, especially to prevent unauthorized access. 9) malware a) The Internet is built around the notion of free and open access to information with no blocking, throttling, or paid prioritization. b) software that is intended to damage or disable computers and computer systems. c) the process of decoding the data that was encrypted d) an asymmetric encryption method that uses a public key (made available publicly) and a private key (available to owner only). 10) Net neutrality a) part of a computer system or network that is designed to block unauthorized access while permitting outward communication. b) The Internet is built around the notion of free and open access to information with no blocking, throttling, or paid prioritization. c) software that is intended to damage or disable computers and computer systems. d) The standard security technology for establishing an encrypted link between a web server and a browser, typically indicated with a padlock icon in the address bar.

04.04.24 Do Now U6L8 Cybersecurity

autor

Tabela

Vizuelni stil

Postavke

Promeni šablon

Vrati automatski sačuvano: ?