COMPUTER LITERACY CHAPTER 7 "VOCABULARY"

Ace your homework & exams now with Quizwiz!

Botnet

A collection of zombie computers that work together to conduct an attack

Zombie

A computer that is connected to the Internet and is controlled by a hacker or other cyber criminals without the owner's knowledge

Viruses

A form of malware that once installed on a host computer without the owners knowledge can replicate itself and spread to other media on the infected computer into other computers on the network

Identity theft

A growing area of cyber crime involves online fraud or scams that are designed to trick unsuspecting users into revealing personal information to the criminal can steal money from the individual

Firewall

A hardware, software, or a combination of hardware and software that blocks unwanted access to your network

Strong password

A password that is difficult to hack by humans or password detection software programs

Rootkit

A program hides on the infected computer and provides a way to bypass computer security for a hacker or other cyber criminal to remotely monitor would take over control of the PC

Trojan horse

A program that disguises itself as a useful program but then infection computer with malware when you run the application

Worm

A self replicating program that requires no action on the part of the user to copy itself to another computer on the network

Cookie

A text file that is used to identify you when you return to a website

White hats

A type of hacker that is paid by organization to pack their network

Black hats

A type of hacker who gains unauthorized access with malicious intent to steal data or from one's personal gain

Keystroke loggers

A version of spyware maybe activated as part of a root kit or Trojan horse that records every keystroke you type and send it back to the cyber criminals

Back door

A way to bypass computer security for a hacker other cyber criminal remotely monitor or take over control of the PC

Acceptable use policy

A written policy that describes for employees, students, or other network users that permitted use yours for computing equipment in networks

Antivirus program

All computer users need to have an up to date program running on their computer at all times

Hacker

An individual who accesses a network without permission

Intrusion detection software

Analyzes network traffic for suspicious saddle in alerts network administrators to possible system threats

Spam

And electronic junk mail unsolicited emails sent to a large group of people at the same time

Biometric devices

Authenticate A person's identity using physical characteristics such as a fingerprint, I was scanned, or voice recognition

Piggybacking

Connecting to someone's else's wireless network without the network owner's intent or consent to provide access

Macro virus

Hey type of virus that is embedded in a document and infects the computer when the user opens a document in enables a macro

War driving

In individual with a portable computing device who drives around trying to connect to someone else's unsecure wireless network

Hacking

Involves gaining unauthorized entry into a networks resources

Pharming

Is similar to pishing except that the individual is tricked into typing in personal information at a phony website that appears to be the real website and requested by the individual

Denial of service attack

Occurs when I network or Web server is overwhelmed with network traffic in the form of a constant stream of Boggess emails or other messages to the point that the servers response time become slow or shuts down completely

Clickjacking

Occurs when a button, graphics, or a link on a webpage appears to be real but, when clicked, causes maicious software to run

Spoofing

Pishing in pharming scams in other techniques where he senders email address is altered to a phony address that appears legitimate to the email recipe, or an IP address is altered to appear to be a trusted source

Twitter bots

Software programmed to follow people based on popular keywords

Adware

Software programs responsible for pop up ads that appear on your desktop or while viewing webpages

Spyware

Software programs that exist on your computer without your knowledge and track your activities

Information privacy

The right of individuals or organizations to control the information is collected about them

Phishing

The term that describes activities that appear to be initiated by a legitimate organization (such as ones bank). In an attempt to obtain personal information that can be used in fraud theft or identity theft

Transport layer security TLS

These signs indicate a secure website using a protocol that protects data sent to the site

Wi-Fi protection access and WPA2

Two are the more recent security standards that authenticate users in employee sophisticated encryption techniques

Unauthorized use

Using a computer, network, or other resource for purpose other than the intended use

Unauthorized access

Using a computer, network, or other resource without permission

Mobile malware

Viruses design for mobile devices increased 1,200% in the first quarter of 2012

Bluetooth risks

When using Bluetooth in a public space with many people nearby a risk exist that someone else can connect your device and send you a virus or access personal data

Encryption

Wireless routers and access points should also be set to use the highest security standard available for the device


Related study sets

Open assesment Chapter 3,4, 5, 8

View Set

test 2 ch 16 disordersof brain function

View Set

Peds Hematology practice questions

View Set

Topic 6: Introduction to Financial Statement Analysis

View Set