CS chapter 9

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

cookies

-small text files that some websites automatically store on your hard drive when you visit them -provide websites with information about your browsing habits, such as the ads youve opened, the products youve looked at and the time duration of your visits

zombie

a computer that a hacker controls in the back door programs manner is refereed to as this ____. they are often used to launch denial -of-service attacks on other computers

surge protector

a device that protects your computer against power surges

biometric authentication device

a device that reads a unique personal characteristic such as a finger print of the iris pattern in your eye and converts its pattern to digital code

personal firewall

a firewall specifically designed for home networks

botnet

a large group of software programs(called robots or bots) that suns automatically on zombie computers. some have been known to span 1.5 million computers

geotag

a piece of data attached to a photo that indicates your latitude and longitude when you took the photo

virus signature

a portion of the virus code thats unique to a particular computer virus.

packet analyzer (sniffer)

a program deployed by hackers that looks at each packet as it travels on the internet- not just those addressed to a particular computer but all packets coming across a particular network

trojan horse

a program that appears to be something useful or desirable, like a game or screen saver, but while it runs, it does something malicious in the background, without you knowing

script

a series of commands - actually a miniprogram - that is executed without your knowledge . often used to perform useful, legitimate functions on websites, such as collecting name and address information from customers.. some are malicious

firewall

a software program or hardware device designed to protect computers from hackers. named after housing construction feature that slows the spread of fires from house to house

scarware

a type of malware that downloads onto your computer and tries to convince you that your computer is infected with a virus or other type of malware

macro virus

a virus that attaches itself to a document that uses macros

time bomb

a virus that is triggered by the passage of time or on a certain date

kburra.com

also can help you monitor cookies

cybercrime

an criminal action perpetrated primarily through the use of a computer. the existence of this means that computer users must take precautions to protect themselves

pendrivelinux.com

an excellent resource that offers many different versions of linux for download and includes step by step instructions on how to install them on your flash drive

spam filter

an option you can select in your email account that places known or suspected spam messages to a special folder

download.com

anti spyware programs that are easy to install and update

logical ports

are virtual - that is not physical - communications gateays or paths that allow a computer to organize requests for information =, such as web page downloads or email routing, from other networks or computers. you cant see or touch this, its a part of the computers internal organization

network address translation (NAT)

assign internal IP addresses on a network. the internal IP addresses are used only on the internal network and therefore can t be detected by hackers

white-hat hackers

break in to systems for non malicious reasons, such as to test system security vulnerabilities or to expose undisclosed weaknesses

black- hat hackers

break into systems to destroy information or for illegal gain

polymorphic virus

changes it own code or periodically rewrites itself to avoid detection. infect a particular type of file such as .EXE files for example

symatec.com

conton archives of information on viruses and provide information on viruses and provide step by step solutions for removing them

backups

copies of files that you can use to replace the originals if theyre lost of damaged

cyberfloating

cyber slacking, means using your computer for non work activities while youre being paid to do your job

multipartite virus

designed to infect multiple file types in a effort to fool the antivirus software that is looking for it

absolute.com / brigadoonsoftware.com

enables your computer to alert authorities to the computers location if it is stolen

network attached storage NAS devices and home servers

essentially large hard drives connected to a network of computers instead of one computer and they can be used to back up multiple computers simultaneously

program files

files used to install software, usually found on DVDs or downloaded from the internet. as long as you have the DVDs in a safe place, you shouldnt need to back up these program files

data files

files youve created or purchased, such as research papers, spreadsheets, music , and photo files, contact lists, address books, email archives and your favorites list from your browser

logical port blocking

firewalls are often configured to ignore requests that originate from the internet asking for access to certain ports

packet filtering

firewalls can be configured so that they filter out packets sent to specific logical ports in a process known as ____.

onedrive.com / adrive.com

free storage options

whole house surge protector

function like surge protectors, but they protect all electrical devices in the house

ftc.gov

has identified other methods thieves use to obtain others personal information

encryption viruses

infect your computer, they run a program that searches for common types of data files, such as microsoft word and excel files, and compresses them using a complex encryption key that renders the files unusable

incremental backup

involves backing up only files that have changed or have been created since the last back up was performed

pretexting

involves creating a scenario that sounds legitimate enough that someone will trust you

computer forensics

involves identifying extracting, preserving and documenting computer evidence.

distributed denial of service (DDoS) attack

launches DoS attacks from more than one zombie at the same time

denial of service(DoS) attack

legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system through a computer he or she has taken over as a zombie

phishing

lures internet users to reveal personal information such as credit card numbers, social security numbers, or other sensitive information that could lead to identity theft

drive-by download

many viruses exploit weaknesses in operating systems. malicious websites can be set up to attack your computer by downloading harmful software onto your computer. this is known as ____

image backup or system backup

means that all system application, and data files are backed up, not just the files that changed

keystroke logger (key logger)

monitors keystrokes with the intent of stealing passwords, log in IDs, or credit cards information

hacker

most commonly defined as anyone who unlawfully breaks into a computer system - either an individual computer or a network

pharming

occurs when malicious code is planted on you computer, either by viruses or by your visiting malicious websites, which then alters your browsers ability to find web addresses

data breach

occurs when sensitive of confidential information is copied, transmitted or viewed by an individual who isnt authorized to handle the data

ipvanish.com

offer features such as government-grade encryption of data, enhanced email and anonymous web surfing

Backdoor Programs and Rookits

programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge. they can delete all files on your computer, send email and run programs and just about anything else that you can do with your computer

iron key.com

provide an even higher level of surfing privacy. simply plug in the device into an available USB port on the machine in which you are using, all history and browser caches will be stored on the privacy device, not on the computer you are using

ibackup.com / carbonite.com

provide larger back up storage for a fee

malware

software that as malicious intent

adware

software that sponsored advertisements in a section of your browser window or as a pop-up box. considered legitimate though sometimes annoying, means of generating revenue for those developers who do not charge for their software or information

antivirus software

specifically designed to detect viruses and protect your computer and files from harm

fbi.gov/about-us/investigate/cyber/cyber

specifically to inform the public about types of cyber crimes and methods of protecting yourself

quarantining

stops the execution of the file and virus and notifies you that it has detected a virus. its also places the virus in a secure area on your hard drive so that it wont spread to other files

stealth virus

temporarily erase their code from the files where they reside then hide in the active memory of the computer

rockyou.com

the Imprava Application Defense Center, a computer-security research organization, conducted a review of 32 million passwords that were used at this website

inoculation

the antivirus software records key attributes about your computer files, such as a file size and data created, and keeps these statistics in a safe place on your hard drive

grc.com

the companies ShieldsUP and Leak Test programs are free and easy to run and can pinpoint security vulnerabilities in a system connected to the internet

versaforward.com / sneakemail.com

these services screen your email messages, forwarding only those messages you designate as being okay to accept

spam

unwanted or junk email - find your email address either from a list the purchased or with software that looks for email address on the internet

email viruses

use the address book in the victims email system to distribute the virus

annualcreditreport.com

website to go to and look for and reports that have suspicious activity

spear phishing

when cybercriminals obtain data on individuals that includes information about which companies those individuals have a relationship with, they can engage in much more targeted attacks know as ____.

passwordmeter.com

you can use this site to evaluate your passwords. provides guidelines for good passwords and shows you how integrating various elements such symbols affects the strength score of your password

grey hat hackers

a bit of a cross between black and white hat hackers, they often illegally break into systems merely to flaunt their expertise to the administrator of the system they penetrated or to attempt to sell their services in repairing security breaches

virus

a computer program that attaches itself to another computer program and attempts to spread to other computers when files are exchanged


संबंधित स्टडी सेट्स

Cerebrospinal Fluid Production & Circulation

View Set

Chapter Fourteen: Stress, Coping, and Health

View Set

Science Chapter 12 Test Study Guide

View Set

Cell Physiology BIOL 3310 - Chapter 1 - Introduction to Cells

View Set

MKT 4050 Exam 2, Service Marketing Exam 2, Services marketing 5, Chapter 6: Building Customer Relationships, Chapter 7: Service Recovery, Chapter 10: Physical Evidence and the Servicescape, Chapter 8: Service Innovation and Design

View Set