MIS ch. 17 quiz

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

phishing

A con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.

honeypots

A seemingly tempting, but bogus target meant to draw hacking attempts.

Intrusion detection systems

A system that monitors network use for potential hacking attempts. Such a system may take preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel.

Certificate Authority

A trusted third party that provides authentication services in public key encryption schemes.

Public Key Encryption

A two key system used for securing electronic transmissions. One key distributed publicly is used to encrypt (lock) data, but it cannot unlock data. Unlocking can only be performed with the private key.

CAPTCHA

An acronym for Completely Automated Public Turing Test to Tell Computers and Humans Apart.

brute force attack

An attack that exhausts all possible password combinations in order to break into an account.

Distributed Denial of Service (DDoS)

An attack where a firm's computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site's use.

zero-day exploit

Attacks that are so new that they haven't been clearly identified, and so they haven't made it into security screening systems.

cash-out fraudsters

Criminals that purchase assets from data harvesters to be used for illegal financial gain.

data harvesters

Cybercriminals who infiltrate systems and collect data for illegal resale.

shoulder surfing

Gaining compromising information through observation

whitelists

Highly restrictive programs that permit communication only with approved entities and/or in an approved manner.

bones

Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks.

blacklists

Programs that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions.

encryption

Scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.

white hat hacker

Someone who uncovers computer weaknesses without exploiting them.

spoofed

Term used in security to refer to forging or disguising the origin or identity.

multi-factor authentication

When identity is proven by presenting more than one item for proof of credentials.


Kaugnay na mga set ng pag-aaral

APUSH Unit 4.1 - 4.4 : Topic Questions - AP Classroom

View Set

AWS Cloud Practitioner Exam Topics

View Set

Information Management 2018 - 2019

View Set