• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/19

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

19 Cards in this Set

  • Front
  • Back

Adware

Any software package that automatically plays, displays, or downloads advertisements to a computer after the software is installed or while the application is being used.

Backdoor

A program that gives someone remote, unauthorized control of a system or initiates an unauthorized task.

Bayesian Filter

A special algorithms, such as Bayesian filters, to determine whether email is considered spam.

Content Zones

Zones used to define and help manage security when visiting sights.

Cookie

A piece of text stored by a user's web browser. This file can be used for a wide range of purposes, including user identification, authintication, and storing site prefrences and shopping cart contents.

Malicious Software (Malware)

Software that is designed to infiltrate or affect a computer system without the owner's informed consent. The term "Malware" is usually associated with viruses, worms Trojan horses, spyware, rootkits, and dishonest adware.

Microsoft Baseline Security Analyzer (MBSA)

A software tool released by microsoft to determine the security state of a system by assessing missing security updates and less-secure security settings within microsoft windows components such as the Internet Explorer, IIS web server, and products such as Microsoft SQL Server and Microsoft Office micro settings.

Offline files

Copies of network files that are stored on your computer so you can access them when you arnt connected to the network or when the network folder that contains the files is not connected.

Pharming

An attack aimed at redirecting a websights traffic to a bogus website.

Phishing

A technique based on social engineering, where users are asked (Usually through email or web) to supply personal info.

Pop-Up Window

A component used on web pgs that can be used as part of a useful website controls, but can also be used for annoying advertisements, and a few may attempt to load spyware or other malicious programs.

Rootkit

A software or hardware device designed to gain administorator-level control over a computersystem without being detected.

Sender Policy Framework (SPF)

An email validation system designed to prevent email spam that uses sourse address spoofing. SPF allows administrators to specify DNS SPF records in public DNS which hosts are allowed to send email from a given domain.



Spam

Junk email that is usually sent unsolicited.

Spyware

A type of malware that is installed on a computer to collect a user's personal information or details about his or her browsing habits, often without the user's knowlage.

Trojan Horse

An executable program that appears as a desirable or useful program. Because it appears to be deplorable or useful, users are tricked into loading and executing the program on their systems.

User Account Control (UAC)

A feature that started with Windows Vista and is included with Windows 7. UAC helps prevent unauthorized changes to your computer ~ and in doing so, it helps protect your system from malware.

Virus

A program that can copy itself and infect a computer without the user's concent or knowlage

virus hoax

A message warning the racipient of a nonexistant computer virus threat, usually sent as a chain email that tells the recipient to forward it to everyone he/she knows. This is a form of social engeneering that plays on peoples ignorance and fear.