Wad up, it's ya boy Reddit User

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

EULA

(End user license agreement) contract between the licensor and purchaser, establishing the purchaser's right to use the software.

Gabby Bacon

A pretty swell person ;)

DoS (Denial of Service)

a cyber-attack where the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

Hoax

a deliberately made rumor that is spread as the truth.

Browser Hijacker

a form of unwanted software that modifies a web browser's settings without a user's permission, to inject unwanted advertising into the user's browser

Hacker

a highly trained computer expert capable of breaking into computer systems and networks using bugs and exploits.

Bot net

a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g., to send spam messages.

Computer Worm

a program that infects a computer without any manual human action. They can be used to take over a file or transport features onto a computer.

Trojan Horse Virus

a program that is designed by hackers to look like a useful software but misleads and ends up harming the computer. Make up most malware.

Zombie

a zombie is a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction.

Social Engineering

an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.

Malware

any software used to disrupt computer or mobile operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising.

Phishing

attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity

Pharming

cyber attack intended to redirect a website's traffic to another, fake site.

Virus

designed to perform any damage to a computer. Attaches itself to a downloaded file and reproduces itself. They, however, need human action in order to infect or spread.

Spam

irrelevant or inappropriate messages sent on the Internet to a large number of recipients. unwanted or intrusive advertising on the Internet.

Backdoor

method, often secret, of bypassing normal authentication in a product. Often used for securing unauthorized remote access to a computer, or obtaining access to plaintext in cryptographic systems.

Pop-Up

often forms of online advertising on the World Wide Web intended to attract web traffic or capture email addresses. Generally new web browser windows to display advertisements.

Clickbait

on the Internet content, especially that of a sensational or provocative nature, whose main purpose is to attract attention and draw visitors to a particular web page.

Encryption

process of encoding messages or information in such a way that only authorized parties can access it.

Adware

software that automatically displays or downloads advertising material (often unwanted) when a user is online.

Spyware

software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

Mouse Trapping

techniques used by some websites in order to stop someone from leaving which include countless pop up ads or opening itself in a different tap or browser.

Keystroke Logger

the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Used to watch the interaction of the person typing or get their personal information.


Set pelajaran terkait

Animals (Ctenophora and Cnidaria)

View Set

Marketing Pearson Questions (Final)

View Set

D.2 Analyze short stories: set 2 JCB

View Set

Entrepreneurs and Entrepreneurship and The Entrepreneurial process

View Set

ATI - Circulation and Perfusion 1

View Set