Chapter 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Zombie

A computer controlled by a hacker

Pharming

is a type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer.

Spam Filter

is computer software that is designed to prevent spam messages from entering into a user's email inbox.

Dos

is designed to interrupt or stop network traffic by flooding it with too many request.

Cybercrime

A crime is which a computer is the object of the crime or is used to commit a criminal offense.

Cyberterrorist

A cyberterrorist uses computers and the Internet to launch attacks against computer systems for political or ideological reasons.

Worm

A destructive program that replicates itself throughout a single computer or across a network.

Firewall options

A firewall is an application that executes different tasks than those executed by antivirus or anti-malware apps.

Keystroke Logger

A form of spyware that records all actions typed on a keyboard

Trojan

A program that appears legitimate, but executes an unwanted activity when activated.

Password

A secret code use to help prevent unauthorized access to data and user accounts.

E-mail virus

A virus that is attached in a file and sent via e-mail message. When that infected file is opened, the virus infects the computer.

Script Kiddie

Amateur computer hackers with little programming expertise

Virus Symptoms

Computers infected with a virus exhibit many symptoms including:

DDoS

Computers that have been infected by a virus act as zombies and work together to send out illegitimate messages creating a huge volumes of network traffic.

Internet Filter

Firewall software used to block a user's access to specific Internet content.

Firewall

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses.

Cookie

Small text file of information created by websites you visit that your web browser stores on you hard disk.

Virus

Software that infects computers.

Packet Sniffer

Specialized hardware or software that capture packets transmitted over a network.

Malware

Steal information, destroy data, incapacitate a computer or network and frustrate the user.

Session Cookie

Stored in temporary memory and is lost when the browser is closed

Persistent Cookie

Stored on a user's hard drive and collects information about

Rootkit

Type of Malware that hides in the operating system and is triggered each time you boot your computer.

Single event - Victims

Unknowingly downloading a trajon horse virus or installing a keystroke logger

Windows firewall

You can customize four settings for each type of network location in Windows Firewall.

cyberattack

a deliberate misuse of computers and networks via the internet.

Macro virus

a virus written in a macro language and placed within a document or spreadsheet

Online Nuisances

annoying software programs that can slow down the operations a computer, clog email inboxes, and lead to the theft of information and money.

Antivirus Software

is a computer program that is used to scan files to identify and remove computer viruses and other malicious programs.

Spam

is an unsolicited email message.

Spyware

is software that collects information about your Internet surfing habits and behaviors.

Hacktivism

is the act of hacking, or breaking into a computer system for a politically or socially motivated purposes.

Phishing

is the illegitimate use of an email message that appears to be from an established organization such as a financial institution, or insurance company


Ensembles d'études connexes

Chapter 10: Exercise for Health and Fitness

View Set

GACE: Major American Authors & Summary of Works

View Set

Environmental Systems and Controls Final

View Set

Chapter 41: Management of Patients with Intestinal and Rectal Disorders

View Set