Principles of Information Security

Ace your homework & exams now with Quizwiz!

Brownout

A long term decrease in electrical power availability.

Surge

A long term increase in electrical power availability.

Blackout

A long term interruption or outage in electrical power availability.

Trojan Horse

A malware program that hides its true nature and reveals its designed behavior only when activated.

Polymorphic threat

A malware, a virus, or a worm that, over time, changes the way it appears to anti-virus software programs, making it undetectable by techniques that look for pre-configured signatures.

Sag

A short term decrease in electrical power availability.

Spike, a Swell

A short term increase in electrical power availability.

Fault

A short term interruption in electrical power availability.

Virus

A type of malware that is attached to other executable programs. When activated, it replicates and propagates itself to multiple systems, spreading by multiple communications vectors.

Worm

A type of malware that is capable of activation and replication without being attached to an existing program.

Boot virus, or boot sector virus

A type of virus that targets the boot sector, or master boot record, or a computer system's hard drive or removable storage media.

Macrovirus

A type of virus written in a specific macro language to target applications that use the language. It typically affects documents, slide shows, emails, or spread sheets created by Office Suite applications.

Memory-resistant virus, or resident virus

A virus that is capable of installing itself in a computer's operating system starting when the computer is activated and residing in the system's memory, even after the host application is terminated.

Zero-day attack

An attack that makes use of malware that is not yet known by the anti-malware software companies.

Spyware

Any technology that aides in gathering information about people or organizations without their knowledge.

Adware

Malware intended to provide undesired marketing and advertising, including popups and banners on a user's screen.

Shoulder surfing

The direct, covert observation of individual information or system use.

Noise

The presence of additional and disruptive signals in network communications or electrical power delivery.

Trespass

Unauthorized entry into the real or virtual property of another party.

Electrostatic discharge, or Static Electricity

When it comes into contact with technology, especially computer


Related study sets

Ch.22- Lymphatic System and Immunity

View Set

Chapter 3 Prenatal development and birth

View Set

Building Materials, Fasteners, and Adhesives

View Set

Meaning of Extension in other Countries

View Set

Psychology Brain States & Consciousness

View Set

All season driving school final test 2

View Set

PSY 200 Study Guide- Mr Nichols, NWSCC

View Set

Chapter 8 History Layup Questions

View Set

Seeley's Anatomy & Physiology 11th ed Chapter 15

View Set

McFarland USA Important Vocab Words

View Set