Glossary
ArrayLists
A dynamic array in Java that can grow or shrink in size, allowing elements to be added or removed after initialization.
Example:
When building a game, an ArrayLists of Enemy
objects can easily manage a varying number of foes on screen.
Authentication
The process of verifying the identity of a user or system, ensuring they are who they claim to be.
Example:
Entering your password to log into an app is a form of authentication to prove your identity.
Brute forcing
A trial-and-error method used to obtain information, such as a password or decryption key, by systematically trying every possible combination until the correct one is found.
Example:
A hacker attempting to guess a password by trying every single word in the dictionary is an example of brute forcing.
Ciphers
Algorithms used for encrypting or decrypting data, allowing information to be scrambled and then unscrambled using a specific key.
Example:
The Caesar cipher shifts each letter by a fixed number of positions, making a message unreadable without knowing the shift amount.
Cryptography
The practice and study of techniques for secure communication in the presence of third parties, primarily focused on securing data.
Example:
The entire field of cryptography is dedicated to making sure your online transactions are private and secure.
Cybercriminals
Individuals or groups who use computers and networks to commit illegal activities, often involving the misuse of personal data.
Example:
A cybercriminal might attempt to phish login credentials to gain unauthorized access to online accounts.
Databases
Organized collections of data, typically stored and accessed electronically from a computer system.
Example:
A school might use a database to store student names, grades, and attendance records.
Encapsulation
An object-oriented programming principle that bundles data and the methods that operate on the data within a single unit, restricting direct access to some of the object's components.
Example:
A Car
class might use encapsulation to keep its speed
variable private, only allowing changes through accelerate()
or brake()
methods.
Encryption
The process of converting information or data into a code to prevent unauthorized access, making it unreadable without the correct key.
Example:
When you send a secure message, encryption scrambles the text so only the intended recipient can read it.
Financial fraud
Deceptive practices used to gain an unfair financial advantage, often involving the manipulation of financial data or transactions.
Example:
Using stolen credit card numbers to make unauthorized purchases online is a common form of financial fraud.
Hash functions
Mathematical algorithms that transform data into a fixed-size string of characters, used for data integrity and non-reversible encryption.
Example:
When you create an account, your password isn't stored directly; instead, a hash function creates a unique, one-way code from it for security.
Identity theft
The fraudulent appropriation and use of another person's identifying information, typically for financial gain.
Example:
If a hacker steals your social security number and opens credit cards in your name, that's a clear case of identity theft.
Key
A piece of information, typically a string of characters or numbers, used in cryptography to encrypt or decrypt data.
Example:
To unlock a secret message encrypted with a key, you need the exact same sequence of characters used to lock it.