Subdecks (3)

Cards (41)

  • User access levels
    One method used to allow certain users read and/or write access to data on a computer system.
  • Suitable passwords
    Different programs may require a user to use different complexities of password, as well as different character lengths.
  • What is a brute force attack?

    When a hacker may have access to programs that have the ability to try multiple guesses in quick succession.
  • Encryption techniques
    Encryption is the conversion of data, using an algorithm, into a form called cyphertext, that cannot be easily understood by people without the decryption key. Typically use XOR to encrypt.