Privacy SG

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

adware

software that is given to the user with advertisements embedded in the application

digital signature

A digital code that can be attached to an electronically transmitted message that uniquely identifies the sender. Like a written signature, the purpose of a ______ is to guarantee that the individual sending the message really is who he or she claims to be.

Google glass

Google's project program for developing a line of hands-free, head-mounted intelligent devices that can be worn by users as "wearable computing" eyewear.

Zombie

a computer that has been implanted with a daemon that puts it under the control of a malicious hacker without the knowledge of the computer owner. ______ are used by malicious hackers to launch DoS attacks. The hacker sends commands to the _____ through an open port. On command, the ___ computer sends an enormous amount of packets of useless information to a targeted Web site in order to clog the site's routers and keep legitimate users from gaining access to the site. The traffic sent to the Web site is confusing and therefore the computer receiving the data spends time and resources trying to understand the influx of data that has been transmitted by the zombies. Compared to program such as viruses or worms that can eradicate or steal information, ____ are relatively benign as they temporarily cripple Web sites by flooding them with information and do not compromise the site's data.

public key encryption

a cryptographic system that uses two keys--a public key known to everyone and a private or secret key known only to the recipient of the message. If a person wants to send a secure message to someone else, that person will uses the other person's public key (one key) to encrypt the message. The other person will then use a private key (another key) to decrypt it.

Trojan horse

a destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. § 7 main types □ Remote Access Trojans □ Data Sending Trojans □ Destructive Trojans □ Proxy Trojans □ FTP Trojans □ Security software disabler Trojans □ Denial-of-service attack (DoS) Trojans

digital signature

a digital code that can be attached to an electronically transmitted message that uniquely identifies the sender. Like a written signature, the purpose of a digital signature is to guarantee that the individual sending the message really is who he or she claims to be.

cookie

a message given to a Web browser by a Web server. The message is then sent back to the server each time the browser requests a page form the server. The browser stores the message in a text file. The main purpose of cookies is to identify users and possibly prepare customized Web pages for them.

Snapchat

a mobile application that allows one to send photos and videos with captions and filters to friends. Once the viewer sees the picture or video, it will disappear.

worm

a program or algorithm that replicates itself over a computer network and usually performs malicious actions, such as using up the computer's resources and possibly shutting the system down.

virus

a program or piece of code that is loaded onto a computer without ones knowledge and runs against ones wishes. It can replicate itself, and are man-made. Those which copies itself repeatedly can be dangerous as it will quickly use all available memory and bring the system to a halt. Some of the more dangerous ones can transmit itself across networks and bypass security systems.

Denial of Service Attack (DoS attack)

a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic.

symmetric encryption

a type of encryption where the same key is used to encrypt and decrypt the message.

SFTP

aka Secure File Transfer Protocol; a method of transferring files between computers over a secure SSH secure data stream

web bug

aka web beacon or pixel tag or clear GIF; an often transparent graphic image, usually no larger than 1 pixel x 1 pixel, that is placed on a web site or in an e-mail that is used to monitor the behavior of the user visiting the web site or sending the e-mail. Used in combination with cookies.

Cyber Dust...

allows you to communicate freely and honestly. Send and receive text messages, stickers, links, photos, videos and more. Your messages are protected from screenshots and disappear after they are read. They are heavily encrypted and never touch a hard drive- not even our own. Once your messages are gone they are truly gone forever never to be recovered.

TOR

an anonymous Internet communication system based on a distributed network. Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet.

spyware

any software that covertly gathers user information through the user's internet connection without his or her knowledge, usually for advertising purposes. Typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet

SPAM

electronic junk mail or junk newsgroup postings

firewall

is a system designed to prevent unauthorized access to or from a private network. _____ can be implemented in both hardware and software, or a combination of both. All messages entering or leaving the intranet pass through the ______, which examines each message and blocks those that do not meet the specified security criteria.

WikiLeaks...

is an international, online, non-profit organisation which publishes secret information, news leaks, and classified media from anonymous sources.

cyberstalking...

is defined as using the Internet or other electronic means as a way to harass, intimidate, threaten, monitor or make unwanted advances towards another.

Caesar's Cipher

is named after Julius Caesar, who used it in his private correspondence. It is when letters in a specific message are altered to others in the alphabet in order to encrypt the message. Ex if 4 letter skips were used all a's in the message would be written as d's. one of the simplest and most widely known encryption techniques

Botnet

refers to type of bot running on an IRC network that has been created with a Trojan. When an infected computer is on the Internet the bot can then start up an IRC client and connect to an IRC server. The Trojan will also have been coded to make the bot join a certain chat room once it has connected. Multiple bots can then join in one channels and the person who has made them can now spam IRC chat rooms, launch huge number of Denial of Service attacks against the IRC servers causing them to go down.

pharming

seeks to obtain personal or private (usually financial related) information through domain spoofing. ___ 'poisons' a DNS server by infusing false information into the DNS server, resulting in a user's request being redirected elsewhere. Allows scammers to target large groups.

PGP

technique developed by Philip Zimmerman for encrypting messages. ___ is one of the most common ways to protect messages on the Internet because it is effective, easy to use, and free.

Cipher

text is data that has been encrypted; hence, it is unreadable until it has been converted into plain text (decrypted) with a key. *Caesar's Cipher

phishing

the act of sending an email to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. Phishing emails direct users to fake websites which legitimate organizations already have. Allows scammers to target individuals.

Steganography

the art and science of hiding information by embedding messages within other, seemingly harmless messages. It works by replacing bits of useless or unused data in regular computer files (such as graphics, sound, text; HTML, or even floppy disks) with bits of different, invisible information. This hidden information can be plain text, cipher text, or even images.

cryptography

the art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the message into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called codebreaking, although modern cryptography techniques are virtually unbreakable.

encryption

the translation of data into a secret code. The most effective way to achieve data security. To read an ____ file, one must have access to a secret key or password that enable to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. § 2 main types □ Public-key ___ □ Symmetric ___

HTTPS

the underlying protocol used by the World Wide Web. ____ is with Secure Sockets Layer (SSL), another protocol primarily developed with secure, safe internet transactions in mind


Set pelajaran terkait

Why would a giant ape like King Kong be unlikely to exist?

View Set

Section 1: Growth of the Cotton Industry

View Set

HESI Comprehensive B, Comprehensive Exam A, 2020 exit v 2 ?????

View Set

MATERNAL AND NEWBORN SUCCESS chap 9 High-Risk Intrapartum

View Set

CH 10 Written and Electronic Communication

View Set

Economics Chapter One Assessment

View Set