Created by Andrei Timothy Salazar
about 6 years ago
|
||
innovation(s)
security breach
algorithm
flow patterns
sequencing
iteration
selection
condition (Boolean)
loop
indefinite loops
definite loops
flowchart
imperative statement
descriptive qualifier
cryptography
plaintext
ciphertext
Caesar cipher
Vigenère cipher
cybersecurity
CIA Triad
confidentiality
integrity
availability
authentication
Secure Sockets Layer (SSL)
digital certificate
Distributed Denial-of-Service (DDoS) Attack
firewall
public key encryption
viruses
symmetric encryption
social engineering
phishing
malware
ambiguity
natural language
artificial language
visual programming language
high-level language
low-level language
source code
machine code
compilation
compiler
hardware
RAM
secondary storage
primary storage
Central Processing Unit
pseudocode
sequential execution
unsolvable problem
Halting Problem
undecidable problem
scalability
Big-O Notation
sequential search
binary search
logarithmic behavior
brute forcing
Moore's Law
heuristics
distributed computing
botnets
bitcoin mining