Cyber Security

¡Supera tus tareas y exámenes ahora con Quizwiz!

Bots

A bot is an automated program that runs over the Internet

Back Doors

A feature or defect of a computer system that allows surreptitious unauthorized access to data

Intranet

A local or restricted communications network, especially a private network created using World Wide Web software

Gateway

A network point that acts as an entrance to another network

Hacker

A person who uses computers to gain unauthorized access to data

Cyber Exercise

A planned event during which an organization simulates a cyber disruption to develop or test capabilities

Trojan Horse

A program that claims to rid your computer of viruses but instead introduces viruses onto your computer

Blended Threats

A software exploit which in turns involves a combination of attacks against different vulnerabilities

Virus

Computer viruses are small programs or scripts that can negatively affect the health of your computer.

Antivirus Software

Designed to detect and destroy computer virus

Encryption

Encryption is the process of converting data to an unrecognizable or "encrypted" form. It is commonly used to protect sensitive information so that only authorized parties can view it

Internet

Is global system of interconnected computer networks that use the internet protocol suite

Cybersecurity

Is the body of technology's, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access

Firewall

It acts as a barrier between a trusted system or network and outside connections, such as the Internet.

Worm

Self replicating virus that does not alter files but resides in active memory and duplicates itself

Spyware

Software that enables a user to obtain convert information about another's computer activities by transmitting data from their hard drive

Malware

Software that is intended to damage or disable computers and computer systems

Phishing

The activity of defrauding an online account holder of financial information by posing as a legitimate company

Keylogger

Type of surveillance software that has the capability to record every key stroke you make on a Log file, usually encrypted


Conjuntos de estudio relacionados

Applied Statistics 2 (Cumulative Final)

View Set

International Business Law, Chapter 12 - Imports, Customs, & Tariff Law

View Set

MGT 391 Quantitative Analysis Mid-Term Exam

View Set

CFP - 5111 Textbook Questions I got wrong

View Set