Computer Science-chapter 5
router
A _________ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination.
keyloggers
A type of spyware known as _________ can record the individual keystrokes of a user.
surge protector
A(n) _________ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.
cybercrimes
Actions ranging from creating viruses to disrupting computer networks are often referred to as:
countermeasure
Any step you take to ward off a threat is called a:
mission-critical
Certain types of systems are called _________ because they must run without failure or with nearly instant recovery from failure.
zombies
Computers which are under the external control of a hacker are known as:
packets
Data moves through networks in structures known as _________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.
bandwidth
For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).
encryption
Many types of software and devices use _________ to scramble your data or communication.
cyberterrorism
No form of hacking is as dangerous as _________, which is an attack against a country that seeks to create large-scale chaos and damage to a country's infrastructure.
protocols
Systems follow certain rules, or _________, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.
backups
Very few countermeasures are as effective as _________, which can help you recover data that was lost to almost any type of threat.
true
With identity theft, hackers will essentially assume your identity and begin to open new bank accounts under your name.
Fault-tolerant
_________ computers are able to continue their operation even when problems are present.
Redundant
_________ computers are ones that have multiple hardware systems performing the same task at the same time.
Phishing
_________ involves luring individuals into entering personal information into a website controlled by the hacker.
spyware
_________ is a type of malware which is designed to report activity on your computer to another party.
Data mining
_________ is the discovery of new patterns or relationships between data.
wireless
_________ networks use radio signals that travel through the air to transmit data.
Strong
_________ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.
Attenuation
_________ refers to the loss of intensity and clarity of the data signal being transmitted.
DDoS
A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
repeater
A _________ is used to prevent attenuation when packets are traveling long distances.