Chapter 9: Technology in action

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

backup

(computer science) a copy of a file or directory on a separate storage device

firewall

(computing) a security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers

uninterpretable power source (UPS)

...

network address translation (NAT)

A TCP/IP protocol developed as a solution to the dwindling number of IP addresses on the Internet and that also serves to hide IP addresses on a private network from the Internet. (16)

packet filtering

A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.

zombie computer

A computer connected to the Internet that has been compromised by a cracker, computer virus or trojan horse and can be used to perform malicious tasks of one sort or another under remote direction.

logical port blocking

A condition in which a firewall is configured to ignore all incoming packets that request access to a certain port so that no unwanted requests will get through to the computer.

program file

A file that contains instructions designed to be executed by the CPU.

botnet

A group of computers that have been infected with bot malware without users' knowledge, enabling a hacker to use the amassed resources of the computers to launch distributed denial-of-service attacks, phishing campaigns or spam.

white-hat hacker

A hacker who breaks into systems just for the challenge of it (and who doesn't wish to steal or wreak havoc on the systems). Such hackers tout themselves as experts who are performing a needed service for society by helping companies realize the vulnerabilities that exist in their systems.

virus signature

A portion of the virus code that is unique to a particular computer virus and makes it identifiable by antivirus software.

malware

A program or a set of program instructions that are designed to enter a computer and disrupt its normal operations

cookie

A small piece of information stored on a user's computer designed to tell a web site that the user has visited that site before.

adware

A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

macro virus

A virus that takes the form of an application (for example, a word-processing or spreadsheet) program macro, which may execute when the program is in use.

dynamic addressing

An IP address that is automatically assigned to a client from a general pool of available addresses and that might be assigned each time the client is started, or it might be assigned for a period of days, weeks, months, or longer.

phishing

An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

cybercriminal

An individual who uses computers, networks, and the Internet to perpetrate crime.

boot-sector virus

An infectious program that can replace the boot program with a modified, infected version of the boot command utilities, often causing boot and data retrieval problems

pharming

An online scam that attacks the browser's address bar. Users type in what they think is a valid website address and are unknowingly redirected to an illegitimate site that steals their personal information.

time bomb

Computer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.

static addressing

IP address is always the same and is assigned by your ISP; process often used by businesses hosting a Web site; more vulnerable to hackers because address more permanent and easy for hackers to make repeated visits

data file

collection of records

spyware

computer software that is designed to collect personal info about users without their informed consent

cybercrime

crime committed using a computer and the internet to steal a person's identity or sell contraband or stalk victims or disrupt operations with malevolent programs

cyberloafing

doing anything with a computer that is unrelated to a job (such as playing video games), while one is supposed to be working. Also called cyberslacking.

surge protector

electrical device inserted in a power line to protect equipment from sudden fluctuations in current

script

is program code for a specific task such as a rollover.

multipartite virus

literally meaning "multipart" virus; a type of computer virus that attempts to infect both the boot sector and executable files at the same time.

pretexting

people act under false pretenses to gain confidential information. ex: call help desk saying they're an employee who forgot their password

packet sniffer

software agent capable of monitoring all data traffic through a network interface card (NIC) running in promiscuous mode

identity theft

the co-option of another person's personal information (e.g., name, social security number, credit card number, passport) without that person's knowledge and the fraudulent use of such knowledge

drive-by download

the use of malicious software to attack your computer by downloading harmful programs onto your computer, without your knowledge, while you are surfing a Web site.

spam

unwanted e-mail (usually of a commercial nature sent out in bulk)

social engineering

using ones social skills to trick people into revealing access credentials or other information valuable to the attacker

antivirus software

Utility programs that prevent infection or scan a system to detect and remove viruses. McAfee Associates' VirusScan and Norton AntiVirus are two popular AV packages.

logic bomb

a computer virus that runs when a certain set of conditions is met, such as when specific dates are keyed off the computer's internal clock.

Trojan horse

a destructive program that masquerades as an application, the software initially appears to perform a desirable function for the user prior to installation, but steals information or harms the system , a program that appears desirable but actually contains something harmful

biometric authentication device

a device that uses some unique characteristics of human biology to identify authorized users.

black-hat hacker

a hacker who uses his knowledge to destroy information or for illegal gain.

encryption virus

a malicious program that searches for common data files and compresses them into a file using a complex encryption key, thereby rendering the files unusable.

inoculation

a process used by antivirus software; compares old and current qualities of files to detect viral activity

backdoor program

a program that enables a hacker to take complete control of a computer without the legitimate user's knowledge or permission

master boot record

a program that executes whenever a computer boots up, ensuing that the virus will be loaded into memory immediately, even before virus protection programs can load

hacker

a programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism

virus

a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer

worm

a software program capable of reproducing itself that can spread from one computer to the next over a network

whole-house surge protector

a surge protector that is installed on (or near) the breaker panel of a home and protects all electronic devices in the home from power surges.

incremental backup (partial backup)

a type of backup that only backs up files that have changed since the last time those files were backed up.

keystroke logger

a type of spyware program that monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information

logical port

a virtual communications gateway or path that enables a computer to organize requests for information (such as Web page downloads and e-mail routing) from other networks or computers.

polymorphic virus

a virus that changes its virus signature (the binary pattern that makes the virus identifiable) every time it infects a new file. This makes it more difficult for antivirus programs to detect the virus.

stealth virus

a virus that hides its tracks after infecting the computer. Once the computer has been infected, the virus can make modifications to allow the computer to appear that it has not lost any memory or that the file size has not changed

e-mail virus

a virus transmitted by e-mail that often uses the address book in the victim's e-mail system to distribute itself.

hoax

an act intended to fool or deceive others

script kiddy

an amateur hacker who lacks sophisticated computer skills. These individuals are typically teenagers, who don't create programs used to hack into computer systems but instead use tools created by skilled hackers that enable unskilled novices to wreak the same havoc as professional hackers.

denial-of-service (DOS) attack

an attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system that tie up its resources and deny legitimate users access.

spam filter

an option you can select in your e-mail account that places known or suspected spam messages into a folder other than your inbox.

Image backup (system backup)

backs up all system, app, and data files-makes exact copy so if your hard drive fails it's configured as before the crash

bomb software

Software that destroys data on a computing device if someone continually tries to access information by guessing the password

personal firewall

Software that runs as a program on a local system to protect it against attacks.

internet protocol address (IP address)

The means by which all computers connected to the Internet identify each other. It consists of a unique set of four numbers separated by dots such as 123.45.178.91.

quarantining

The placement (by antivirus software) of a computer virus in a secure area on the hard drive so that it won't spread infection to other files.


Ensembles d'études connexes

marketing final ch. 6,7,8,11 quiz

View Set

accounting 202: selling, administrative, direct or indirect cost

View Set

Chapter 10: Future Projections and Extremes of Climate

View Set

Chapter 27: Safety, Security, and Emergency Preparedness

View Set

Pharms exam 6 :ATI Reproductive & genitourinary system

View Set