COMPUTER LITERACY CHAPTER 7 "VOCABULARY"
Botnet
A collection of zombie computers that work together to conduct an attack
Zombie
A computer that is connected to the Internet and is controlled by a hacker or other cyber criminals without the owner's knowledge
Viruses
A form of malware that once installed on a host computer without the owners knowledge can replicate itself and spread to other media on the infected computer into other computers on the network
Identity theft
A growing area of cyber crime involves online fraud or scams that are designed to trick unsuspecting users into revealing personal information to the criminal can steal money from the individual
Firewall
A hardware, software, or a combination of hardware and software that blocks unwanted access to your network
Strong password
A password that is difficult to hack by humans or password detection software programs
Rootkit
A program hides on the infected computer and provides a way to bypass computer security for a hacker or other cyber criminal to remotely monitor would take over control of the PC
Trojan horse
A program that disguises itself as a useful program but then infection computer with malware when you run the application
Worm
A self replicating program that requires no action on the part of the user to copy itself to another computer on the network
Cookie
A text file that is used to identify you when you return to a website
White hats
A type of hacker that is paid by organization to pack their network
Black hats
A type of hacker who gains unauthorized access with malicious intent to steal data or from one's personal gain
Keystroke loggers
A version of spyware maybe activated as part of a root kit or Trojan horse that records every keystroke you type and send it back to the cyber criminals
Back door
A way to bypass computer security for a hacker other cyber criminal remotely monitor or take over control of the PC
Acceptable use policy
A written policy that describes for employees, students, or other network users that permitted use yours for computing equipment in networks
Antivirus program
All computer users need to have an up to date program running on their computer at all times
Hacker
An individual who accesses a network without permission
Intrusion detection software
Analyzes network traffic for suspicious saddle in alerts network administrators to possible system threats
Spam
And electronic junk mail unsolicited emails sent to a large group of people at the same time
Biometric devices
Authenticate A person's identity using physical characteristics such as a fingerprint, I was scanned, or voice recognition
Piggybacking
Connecting to someone's else's wireless network without the network owner's intent or consent to provide access
Macro virus
Hey type of virus that is embedded in a document and infects the computer when the user opens a document in enables a macro
War driving
In individual with a portable computing device who drives around trying to connect to someone else's unsecure wireless network
Hacking
Involves gaining unauthorized entry into a networks resources
Pharming
Is similar to pishing except that the individual is tricked into typing in personal information at a phony website that appears to be the real website and requested by the individual
Denial of service attack
Occurs when I network or Web server is overwhelmed with network traffic in the form of a constant stream of Boggess emails or other messages to the point that the servers response time become slow or shuts down completely
Clickjacking
Occurs when a button, graphics, or a link on a webpage appears to be real but, when clicked, causes maicious software to run
Spoofing
Pishing in pharming scams in other techniques where he senders email address is altered to a phony address that appears legitimate to the email recipe, or an IP address is altered to appear to be a trusted source
Twitter bots
Software programmed to follow people based on popular keywords
Adware
Software programs responsible for pop up ads that appear on your desktop or while viewing webpages
Spyware
Software programs that exist on your computer without your knowledge and track your activities
Information privacy
The right of individuals or organizations to control the information is collected about them
Phishing
The term that describes activities that appear to be initiated by a legitimate organization (such as ones bank). In an attempt to obtain personal information that can be used in fraud theft or identity theft
Transport layer security TLS
These signs indicate a secure website using a protocol that protects data sent to the site
Wi-Fi protection access and WPA2
Two are the more recent security standards that authenticate users in employee sophisticated encryption techniques
Unauthorized use
Using a computer, network, or other resource for purpose other than the intended use
Unauthorized access
Using a computer, network, or other resource without permission
Mobile malware
Viruses design for mobile devices increased 1,200% in the first quarter of 2012
Bluetooth risks
When using Bluetooth in a public space with many people nearby a risk exist that someone else can connect your device and send you a virus or access personal data
Encryption
Wireless routers and access points should also be set to use the highest security standard available for the device