Two or more computers that are linked in order to share resources or information
What is a Network?
A school districts private network is an example of this kind of network.
What is a Local Are Network (LAN)?
A small bit of text placed on the hard drive of your computer by the server of a website that you visit
What is a Cookie?
The trail of data you create while using the Internet.
What is a Digital Footprint?
A telecommunications network that extends over a large geographical distance, like the internet.
What is a Wide Area Network (WAN)?
In order to travel more quickly, data is broken into these as it travels across networks.
What are packets?
Process of gathering and analyzing information about an individual that exists online.
What is Digital Profiling?
Temporary storage of web documents.
What is Cache?
A unique string of numbers assigned to your computer to identify your location.
What is an IP address?
Cloud computing that can access applications online like Google Docs.
What is Software as a Service (SAAS)
The process of encoding information so that only authorized parties can access it and those who are not authorized cannot
What is Encryption?
Fraudulent attempt to obtain sensitive information (such as passwords or financial information) by pretending to be a legitimate entity.
What is Phishing?
The duplication of critical components or functions of a system to increase reliability, for example, having a back-up of your data
What is redundancy?
Cloud computing service that can be used to develop your own applications.
What is Platform as a Service (PAAS)?
A sequence of operations that ensure protection of data.
What are Security Protocols?
A weakness that can be exploited by a threat, such as an attacker, to perform unauthorized actions within a computer system.
What is Vulnerability?
A system of rules that allow two or more devices to communicate information to one another.
What are Protocols?
Cloud computing service that can be used to create Virtual Machines.
What is Infrastructure as a Service (IAAS)?
Potential threats to your network are identified from a hypothetical attacker’s point of view in order to keep your information safe.
What are Threat Models?
A type of encryption that uses public and private keys to send data.
What is Asymmetrical encryption?