Ch. 10 Security Test

Ace your homework & exams now with Quizwiz!

Keylogger

A computer program or hardware device that captures information or user enters on the keyboard.

Trojan horse

A computer program that appears to be something useful or desirable (such as a game or screensaver), but at the same time does something malicious in the background without the user's knowledge.

Bot

A computer that is infected with malware and is part of botnet under the control of a master.

Logic bomb

A computer virus that runs when a certain set of conditions is met, such as when the program is launched a specific number of times.

Router

A device that routes packets of data between two or more networks.

Bug

A flaw in software programming.

Cyber-stalking

A form of computer harassment that is serious in nature, with a pattern of harassment and a credible threat of harm. Catch up

Phishing

A form of cybercrime in which email messages and IM's that appear to be from those you do business with— such as your bank, credit card company, social network, auction site, online payment processor or IT administrator— are designed to trick you into revealing information.

Pharming

A form of cybercrime that redirects you to a phony website even if you type the correct address in your browser.

Browser hijacker

A form of malware that changes your home page and redirects you to other websites.

Ransomware

A form of malware that prevents you from using your computer until you pay a fine or fee.

Antispyware software

A form of security software necessary to prevent adware and spyware infections.

Antivirus program

A form of security software that protects against viruses, Trojan horses, worms, and spyware.

Service pack

A large, plan software update that address is multiple problems or ads multiple features and includes previous patches and hotfixes.

Service Set Identifier (SSID)

A network name that wireless routers use to identify themselves.

Botnet

A network of computer zombies, or bots, controlled by a master, which can be used to send out span and viruses or to launch a denial-of-service attack.

Security suite

A package of security software that includes accommodation of features such as antivirus, firewall, and private protection.

Acceptable Use Policy (AUP)

A policy that computer and network users must abide by that forces users to practice safe computing.

Adware

A program that downloads on our computer when a user installs a freeware program , game, or utility. Generally, adware enables sponsored advertisements to appear in a section of a browser window or as a pop-up ad.

Computer fraud

A scheme perpetrated over the Internet or by email that tricks a victim in to voluntarily and knowingly giving money or property.

Network Address Translation (NAT)

A security feature of a router that shield the devices on a private network from the public network (the Internet).

Cookie

A small text file written by a website that you visit. It is used to add functionality to the page or to analyze the way that you use the website and track what websites you visit next.

Clickjacking

A social network attack in which clicking on a link allows malware to post unwanted links on your page.

Patch

A software update that addresses an individual problem When it is discovered. Also called a hotfix.

Hotfix

A software update that addresses an individual problem When it is discovered. Also called a patch.

Time bomb

A virus that's triggered by the passage of time or on a certain date.

Payload

An action or attacked by a computer virus or other malware.

Bitcoin

An anonymous, digital, encrypted currency.

Denial-of-service attack

An attack that sends out so much traffic that it could cripple a server or network.

Internet Crime Complaint Center (IC3)

An organization that provides a website for victims to report cybercrimes.

Cyber-terrorism

An unlawful attack against computers and networks that's done to intimidate a government or it's people for a political or social agenda.

Spyware

An unwanted piggyback program that downloads with the software you want to install from the Internet and then runs in the background of your system. Catchy

Cybercrime

Any criminal action perpetrated primarily through the use of a computer.

Shill bidding

Fake bidding by a seller or his or her accomplice to drive up the price of an auction item.

Firewall

Is a hardware device that blocks unauthorized access to your network, but a software firewall- such as the one that comes within windows also blocks access to an individual machine.

Rootkit

Programs that allow hackers to gain access to your computer and take almost complete control of it without your knowledge. These programs are designed to subvert normal login procedures to a computer and to hide their operations from normal detection methods.

Malware

Software that's Intended to render a system temporarily or permanently useless or to penetrate a computer system completely for purposes of information gathering. Examples include spyware, viruses, worms, and Trojan horses.

Ciphertext

Text that has been encrypted.

Hacking

The act of gaining an authorized access to a computer system or network.

Identity theft

The process by which someone uses personal information about someone else (such as the victim's name, address, and Social Security number) to assume the victim's identity for the purpose of defrauding another.

Encryption

The process of changing text-based information into a state in which a key is required in order to read the information.

Spamming

The sending of mass, unsolicited emails.

Drive-by download

The use of malicious software to attack a computer by downloading harmful programs onto a computer, without the users knowledge, while they are surfing a website.

Spam

Unwanted or junk email.

Hactivism

Using computers and computer networks in a subversive way to promote an agenda.

Cyber-harassment

Using technology to harass or intimidate another individual.

Cyberbullying

Using technology to harass or intimidate another individual.

Data breach

When sensitive or confidential information is copied, transmitted, reviewed by an individual who is not authorized to handle the data.


Related study sets

SKILLS LESSON: TRAGEDY, DRAMA, AND SHAKESPEARE

View Set

Lactose Tolerance- Student Guide

View Set

Critical Care Nursing Exam 1 (University of Akron)

View Set

Biology Exam 2 - Chapter 8: Photosynthesis

View Set