ITE 115 CH 9

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

adware

A program that downloads on your computer when a user installs a freeware program, game, or utility. Generally, adware enables sponsored advertisements to appear in a section of a browser window or as a pop-up ad.

backdoor program

A program that enables a hacker to take complete control of a computer without the legitimate user's knowledge or permission.

packet analyzer (sniffer)

A computer hardware device or software program designed to detect and record digital information being transmitted over a network.

Trojan horse

A computer program that appears to be something useful or desirable (such as a game or a screen saver), but at the same time does something malicious in the background without the user's knowledge.

zombie

A computer that is controlled by a hacker who uses it to launch attacks on other computer systems

logic bomb

A computer virus that runs when a certain set of conditions is met, such as when a program is launched a specific number of times.

worm

A program that attempts to travel between systems through network connections to spread infections. Worms can run independently of host file execution and are active in spreading themselves.

logical port blocking

A condition in which a firewall is configured to ignore all incoming packets that request access to a certain port so that no unwanted requests will get through to the computer.

backup

A copy of a computer file that can be used to replace the original if it's lost or damaged

image backup (system backup)

A copy of an entire computer system, created for restoration purposes.

grey-hat hacker

A cross between black and white—a hacker who will often illegally break into systems merely to flaunt his or her expertise to the administrator of the system he or she penetrated or to attempt to sell his or her services in repairing security breaches.

distributed denial-of-service (DDoS) attack

A cyberattack that launches DoS attacks from more than one zombie (sometimes thousands of zombies) at the same time.

surge protector

A device that protects computers and other electronic devices from power surges.

biometric authentication device

A device that uses some unique characteristic of human biology to identify authorized users.

data file

A file that contains stored data.

personal firewall

A firewall specifically designed for home networks.

full backup

A full backup means that you create a copy of all your application and data files.

white-hat hacker (ethical hacker)

A hacker who breaks into systems just for the challenge of it (and who doesn't wish to steal or wreak havoc on the systems). Such hackers tout themselves as experts who are performing a needed service for society by helping companies realize the vulnerabilities that exist in their systems.

black-hat hacker

A hacker who uses his or her knowledge to destroy information or for illegal gain.

botnet

A large group of software applications (called robots or bots) that run without user intervention on a large number of computers.

encryption virus

A malicious program that searches for common data files and compresses them into a file using a complex encryption key, thereby rendering the files unusable.

virtual private network (VPN)

A network that uses the public Internet communications infrastructure to build a secure, private network among various locations.

virus signature

A portion of the virus code that's unique to a particular computer virus and that makes it identifiable by antivirus software.

packet filtering

A process in which firewalls are configured so that they filter out packets sent to specific logical ports

network address translation (NAT)

A process that firewalls use to assign internal Internet protocol addresses on a network.

multi-factor authentication

A process that requires two of the three assigned factors be demonstrated before authentication is granted.

inoculation

A process used by antivirus software; compares old and current qualities of files to detect viral activity.

master boot record

A small program that runs whenever a computer boots up.

cookie

A small text file that some websites automatically store on a client computer's hard drive when a user visits the site.

firewall

A software program or hardware device designed to prevent unauthorized access to computers or networks.

exploit kits

A software toolkit used to take advantage of security weaknesses found in apps or operating systems, usually to deploy malware.

whole-house surge protector

A surge protector that's installed on (or near) the breaker panel of a home and that protects all electronic devices in the home from power surges.

spear phishing

A targeted phishing attack that sends e-mails to people known to be customers of a company. Such attacks have a much greater chance of successfully getting individuals to reveal sensitive data

incremental backup (partial backup)

A type of backup that only backs up files that have changed since the last time files were backed up.

scareware

A type of malware that's downloaded onto your computer and that tries to convince you that your computer is infected with a virus or other type of malware

keystroke logger (keylogger)

A type of spyware program that monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information.

logical port

A virtual communications gateway or path that enables a computer to organize requests for information (such as web page downloads and e-mail routing) from other networks or computers.

polymorphic virus

A virus that changes its virus signature (the binary pattern that makes the virus identifiable) every time it infects a new file. This makes it more difficult for antivirus programs to detect the virus.

boot-sector virus

A virus that replicates itself into the master boot record of a flash drive or hard drive.

stealth virus

A virus that temporarily erases its code from the files where it resides and hides in the active memory of the computer.

macro virus

A virus that's distributed by hiding it inside a macro.

time bomb

A virus that's triggered by the passage of time or on a certain date.

denial-of-service (DoS) attack

An attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system that tie up its resources and deny legitimate users access.

spyware

An unwanted piggyback program that downloads with the software you want to install from the Internet and then runs in the background of your system.

cybercrime

Any criminal action perpetrated primarily through the use of a computer.

social engineering

Any technique that uses social skills to generate human interaction for the purpose of enticing individuals to reveal sensitive information.

computer forensics

The application of computer systems and techniques to gather potential legal evidence; a law enforcement specialty used to fight high-tech crime.

cyberloafing (cyberslacking)

Doing anything with a computer that's unrelated to a job (such as playing video games) while one's supposed to be working.

program file

Files that are used in the running of software programs and that do not store data.

multipartite virus

Literally meaning "multipart" virus; a type of computer virus that attempts to infect computers using more than one method.

pretexting

The act of creating an invented scenario (the pretext) to convince someone to divulge information.

pharming

Planting malicious code on a computer that alters the browser's ability to find web addresses and that directs users to bogus websites.

rootkit

Programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge. These programs are designed to subvert normal login procedures to a computer and to hide their operations from normal detection methods.

antivirus software

Software specifically designed to detect viruses and protect a computer and files from harm.

malware

Software that's intended to render a system temporarily or permanently useless or to penetrate a computer system completely for purposes of information gathering. Examples include spyware, viruses, worms, and Trojan horses.

quarantining

The placement (by antivirus software) of a computer virus in a secure area on the hard drive so that it won't spread infection to other files.

phishing

The process of sending e-mail messages to lure Internet users into revealing personal information such as credit card or Social Security numbers or other sensitive information that could lead to identity theft.

drive-by download

The use of malicious software to attack a computer by downloading harmful programs onto a computer, without the user's knowledge, while they are surfing a website.

data breach

When sensitive or confidential information is copied, transmitted, or viewed by an individual who is not authorized to handle the data.


Ensembles d'études connexes

Chapter 63: Caring for Clients with Orthopedic and Connective Tissue Disorders

View Set

Subjektivna i objektivna stvarnost - tradicionalna novela

View Set

Chapters: 1-5, 9-13, 15-17 (Exams 1 & 2)

View Set

Practical Review Lab 4: Preparation of p-Nitroaniline

View Set

Timeless Season One Episode Two(Lincoln's Assassination)

View Set