Survey Of Operating Systems Chapter 2: Computer Security Basics

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Spyware

A category of software that runs undercover on a user's computer and gathers information without the user's permission.

Third-Party Cookie

A cookie that originates with a domain name beyond the one shown.

Permission

A level of access that describes an action you may preform on an object.

Vector

A method that malware uses to infect a computer.

CyberTerrorist

A person who wreaks havoc on victims worldwide using computer technology.

Bitcoin

A popular form of CryptoCurrency.

Password Cracker

A program or technique used for stealing passwords.

User Account Control (UAC)

A program to prevent unauthorized access to a computer.

Secure HTTP (HTTPS)

A secure connection that encrypts communications between you and the site.

Secret key

A special code used to decrypt encrypted data.

Ransomeware

A type of scareware that threatens to do damage or lock a user out of a computer unless the user pays the "ransom".

Back door

A way someone can gain access to a computer, bypassing the authentication security.

War Driving

Seeking out non-secure Wi-Fi networks.

Pop-up

Separate window that displays uninvited from a web-page.

Keylogger

Short term for "Keystroke Logger".

Malware

Short term for "Malicious Software". I.E. Viruses, Worms, Trojans, Spam, etc.

Firewall

Software or a physical device that examines network traffic.

Content filter

Software that blocks certain content.

Cyber Criminal

Someone who breaks laws using computer technology.

Hacker

Someone with a great deal of computing expertise.

Password

String of characters that you enter.

Spear Phishing

Targeted Phishing

Virus

Term used for all malware.

Bluesnarfing

The act of covertly obtaining information broadcast from wireless devices uses the Bluetooth standard.

Social Engineering

The use of persuasion techniques to gain confidence of individuals.

Social Networking

The use of social media

Spam

Unsolicited email. Often called junk mail.

Fraud

Use of deceit and trickery to persuade someone to hand over money or other valuables.

Token

Use of something you know and have to prove your identity.

Authentication

Verification on who you are

Cookies

Very small files a Web Browser saves on the local hard drive at the request of a website.

Social Networking Site

Website that provides space where members can communicate with on another and share details of their business or personal lives.

Exploit

When a malware takes advantage of some vulnerability in a computer.

Browser Hijacking

When a user redirects your browser to their liking.

Identity Theft

When someone collects personal information belonging to another person and uses that information to fraudulently make purchases, open new credit accounts and even obtain the new driver's licences.

Hotspot

Wi-Fi network that connects to the internet through a router.

Spim

an acronym for spam over instant messaging.

Pop-up blocker

an extension on a Web Browser to block pop-up advertisements.

Spam Filter

software designed to combat spam.

Botherder

someone who initiates controls of a BotNet

Encryption

the transformation of data into unreadable format.

User right

Defines a system-wide action that a user may perform such as logging on to a computer.

Parental Controls

Feature used for protecting children from inappropriate content.

Adware

Form of spyware that collects information about the user in order to display targeted advertisements to the user.

Phishing

Fraudulent method of obtaining personal and financial information through Web page pop-ups, email, etc.

BotNet

Group of networked computers that are infected with programs that forward information to other computers.

Black hat hacker

Hackers with malicious intent.

Keystroke Logger

Hardware device or a program that monitors and records every keystroke.

Header

Information that accompanies a message but does not appear in the message.

Authorization

Level of access to a computer or a resource.

Rootkit

Malware that hides itself from detection by anti-malware programs by concealing itself with the OS code or any program running on he computer.

Secure sockets layer (SSL)

Method used for encrypting information for banking and other personal information

DMZ

Network between a private network and a public network

Trojan Horse

Often just called a Trojan. A type of malware and a vector that gains access to computers by hiding in a different program.

Digital Certificate

Or security certificate, which is stored on a computer.

Pop-up Download

Program downloaded to a user's computer through a pop-up page.

Drive-by Download

Program downloaded to a user's computer without consent.

Worm

Program installed and activated on a computer without the knowledge of permission of their user.

Scareware

Programs designed to scare people into action.

Shoulder surfing

Reading information off your screen while in a public location.

CyberTerrorism

Act of wreaking havoc on victims world wide using computer technology.

User account

An account assigned to a single person.

Group Account

An account shared by multiple people.

Security account

An account that can be assigned permission to take action.

Administrator account type

An account type that has full control of the computer and it's accounts.

Standard user account

An account with standard user privileges. Cannot make changes to the system.

FireVault

An encryption tool on OS X

White hat hacker

An expert who is not a cybercriminal and only explores computer system weaknesses for the purpose of making them secure.

Cybercrime

An illegal activity performed by using computer technology.

Forged e-mail address

An impersonated email address.

Zombie

An individual computer in a BotNet

Guest account

An open account with the least privileges.

Zero-day Exploit

An unknown exploit that is very difficult to protect against.

Email Spoofing

Another term for Forged E-mail Address

Social Media

Any service that provides a place where people can interact in online communities, sharing information in various forms.

First-Party cookie

Cookie that originates with the domain name of the URL that you directly connect.

Password manager

Creates a strong password and remember it for you


Kaugnay na mga set ng pag-aaral

Med/Surg-Chapters 7, 33, and 61 Exam

View Set

Infrastructure - All Lab Questions

View Set

Anatomy & Physiology: Ch.19 Lecture Quiz #4

View Set