digital footprint,All of the information about a person that can be found online
cybersecurity life-cycle,is a process that helps businesses and organizations protect information
code of conduct,a statement that guides the ethical behavior of a company and its employees
virtual machine,One...
PLTW Cybersecurity Unit 1 Personal Security.
digital footprint,All of the information about a person that can be found
online
cybersecurity life-cycle,is a process that helps businesses and
organizations protect information
code of conduct,a statement that guides the ethical behavior of a
company and its employees
virtual machine,One or more logical machines created within one
physical machine and often accessed through the Internet
app,is any program, or group of programs, that is designed for the end
user
script,A collection of code or commands that perform some function
crack,various measures used to discover computer passwords
brute force attack,An attempt to discover information, especially
passwords, through trial and error. Attackers try as many passwords or
phrases as possible hoping one of the guesses is correct
dictionary attack,A type of password attack that automates
, password guessing by comparing encrypted passwords against a
predetermined list of possible password values
algorithm,A set of steps to accomplish a task. An algorithm can be
expressed in many kinds of notation, such as natural language,
pseudocode, and flowcharts.
file extension,A tag of three or four letters, preceded by a period, which
identifies a data file's format or the application used to create the file
authenticate,To confirm your identity using knowledge known only to
you or information interpreted by you.
authorize,To give permission, for example, in order to access
information.
CAPTCHA,A system that can distinguish between a human and an
automated program.
social media,websites and applications used for communication by large
groups of people, enabling them to share information and develop an
online social network
spam,irrelevant or inappropriate messaging sent through email to a large
number of recipients; also known as junk mail.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller cracker. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R253,61. You're not tied to anything after your purchase.