digital footprint,All of the information about a person that can be found
online
cybersecurity life-cycle,is a process that helps businesses and
organizations protect information
code of conduct,a statement that guides the ethical behavior of a
company and its employees
virtual machine,One or more logical machines created within one
physical machine and often accessed through the Internet
app,is any program, or group of programs, that is designed for the end
user
script,A collection of code or commands that perform some function
crack,various measures used to discover computer passwords
brute force attack,An attempt to discover information, especially
passwords, through trial and error. Attackers try as many passwords or
phrases as possible hoping one of the guesses is correct
dictionary attack,A type of password attack that automates
, password guessing by comparing encrypted passwords against a
predetermined list of possible password values
algorithm,A set of steps to accomplish a task. An algorithm can be
expressed in many kinds of notation, such as natural language,
pseudocode, and flowcharts.
file extension,A tag of three or four letters, preceded by a period, which
identifies a data file's format or the application used to create the file
authenticate,To confirm your identity using knowledge known only to
you or information interpreted by you.
authorize,To give permission, for example, in order to access
information.
CAPTCHA,A system that can distinguish between a human and an
automated program.
social media,websites and applications used for communication by large
groups of people, enabling them to share information and develop an
online social network
spam,irrelevant or inappropriate messaging sent through email to a large
number of recipients; also known as junk mail.