Chapter 5
Zombie
A computer controlled by a hacker
Pharming
is a type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer.
Spam Filter
is computer software that is designed to prevent spam messages from entering into a user's email inbox.
Dos
is designed to interrupt or stop network traffic by flooding it with too many request.
Cybercrime
A crime is which a computer is the object of the crime or is used to commit a criminal offense.
Cyberterrorist
A cyberterrorist uses computers and the Internet to launch attacks against computer systems for political or ideological reasons.
Worm
A destructive program that replicates itself throughout a single computer or across a network.
Firewall options
A firewall is an application that executes different tasks than those executed by antivirus or anti-malware apps.
Keystroke Logger
A form of spyware that records all actions typed on a keyboard
Trojan
A program that appears legitimate, but executes an unwanted activity when activated.
Password
A secret code use to help prevent unauthorized access to data and user accounts.
E-mail virus
A virus that is attached in a file and sent via e-mail message. When that infected file is opened, the virus infects the computer.
Script Kiddie
Amateur computer hackers with little programming expertise
Virus Symptoms
Computers infected with a virus exhibit many symptoms including:
DDoS
Computers that have been infected by a virus act as zombies and work together to send out illegitimate messages creating a huge volumes of network traffic.
Internet Filter
Firewall software used to block a user's access to specific Internet content.
Firewall
Hardware or software used to keep a computer secure from outside threats such as hackers and viruses.
Cookie
Small text file of information created by websites you visit that your web browser stores on you hard disk.
Virus
Software that infects computers.
Packet Sniffer
Specialized hardware or software that capture packets transmitted over a network.
Malware
Steal information, destroy data, incapacitate a computer or network and frustrate the user.
Session Cookie
Stored in temporary memory and is lost when the browser is closed
Persistent Cookie
Stored on a user's hard drive and collects information about
Rootkit
Type of Malware that hides in the operating system and is triggered each time you boot your computer.
Single event - Victims
Unknowingly downloading a trajon horse virus or installing a keystroke logger
Windows firewall
You can customize four settings for each type of network location in Windows Firewall.
cyberattack
a deliberate misuse of computers and networks via the internet.
Macro virus
a virus written in a macro language and placed within a document or spreadsheet
Online Nuisances
annoying software programs that can slow down the operations a computer, clog email inboxes, and lead to the theft of information and money.
Antivirus Software
is a computer program that is used to scan files to identify and remove computer viruses and other malicious programs.
Spam
is an unsolicited email message.
Spyware
is software that collects information about your Internet surfing habits and behaviors.
Hacktivism
is the act of hacking, or breaking into a computer system for a politically or socially motivated purposes.
Phishing
is the illegitimate use of an email message that appears to be from an established organization such as a financial institution, or insurance company