Lexical Cards (Network Security)
Lexical Cards (Network Security)
1- Router: A device in a network that handles message transfers between computers. A router receives information and forwards it based on what the router determines to be the most efficient route at the time of transfer.
2- Passwords: A sequence of characters that one must input to gain access to a file, application, or computer system. Also called passkey, secret word or phrase that one uses to gain admittance or access to information.
3- Hacker: One who is proficient at using or programming a computer; a computer buff, uses programming skills to gain illegal access to a computer network or file.
4- Antivirus or anti-virus software: Is used to prevent, detect, and remove computer viruses, worms, and trojan horses. It may also prevent and remove adware, spyware, and other forms of malware.
5- Firewall: Is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.
6- Honeypot: In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers.
7- Encryption: Is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.
8- Wireless network: Refers to any type of computer network that is not connected by cables of any kind. It is a method by which homes, telecommunications networks and enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations.
2- Passwords: A sequence of characters that one must input to gain access to a file, application, or computer system. Also called passkey, secret word or phrase that one uses to gain admittance or access to information.
3- Hacker: One who is proficient at using or programming a computer; a computer buff, uses programming skills to gain illegal access to a computer network or file.
4- Antivirus or anti-virus software: Is used to prevent, detect, and remove computer viruses, worms, and trojan horses. It may also prevent and remove adware, spyware, and other forms of malware.
5- Firewall: Is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting legitimate communications to pass.
6- Honeypot: In computer terminology, a honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data, or a network site that appears to be part of a network, but is actually isolated and monitored, and which seems to contain information or a resource of value to attackers.
7- Encryption: Is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.
8- Wireless network: Refers to any type of computer network that is not connected by cables of any kind. It is a method by which homes, telecommunications networks and enterprise (business) installations avoid the costly process of introducing cables into a building, or as a connection between various equipment locations.
Juan Alvarez- Posts : 11
Join date : 2011-08-22
Age : 31
Location : Barreal de Heredia
Support sheet
Support:
(11/200)
User type: 0
Permissions in this forum:
You cannot reply to topics in this forum
|
|