Save
computer science
Cybersecurity
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Mukue
Visit profile
Subdecks (2)
Network topologies
computer science > Cybersecurity
1 card
Internet
computer science > Cybersecurity
4 cards
Cards (18)
What is cybersecurity
The practice of
protecting systems
, networks and program from
digital attacks
What is
network security
Any activity designed to protect the usability and integrity of
network
and
data
What are hackers
Individuals who will
violate
computer security for malicious or
financial
reason
What is plant the flag
Individuals who may seek
financial reward
for finding
vulnerability
What is
ethical hackers
Individuals whose activities are designed to
test
or designed to
test
and enhance computer security
What is
hacktivists
Individuals who use technology to announce
social
political message and
religious
What is
social engineering
The
psychological manipulation
of the people into performing
actions
or divulged confidential information
What is
keylogging
Software
designed to record and store every
keystroke
made on a computer
What is
phishing
phishing is the act of trying to obtain a
confidential
record such as
password
What is
pharming
Pharming redirect victims to a
bogus
site even if the victim has typed the correct
web
address
What is digital devices
Devices that can be used for
eavesdropping
on live conversation or
voicemails
What is eavesdropping
A technique that involves the social engineer being physically present to
overheat
confidential conversation
What is shoulder surfing
Looking over another person's shoulder to view
passwords
or other data that is being
entered
See all 18 cards