Create an account
authenticates a person's identity by tanslating a personal characteristic, such as a fingerprint into digital code that is then compared with a digital code stored in a computer verifying a physical or behavioral characteristic
someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action
denial of service attack
an assault whose purpose is to disrupt computer access to an internet service such as the web or email
An assault on a computer that is performed by hackers whose purpose is to disrupt access to the Web. DoS attack is short for denial of service attack
intrusion detection software
automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns or system breaches, including violations of firewalls.
a private combination of characters associated with the user name that allows access to certain computer resources
prolonged malfunction of a computer that can cause loss of hardware, software, or data
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together