• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back

ADWARE

SPYWARE THAT CAUSES SOFTWARE ADS TO POP UP ON A MONITOR. COLLECTS SPENDING AND WEB SURFING INFO

CHIPPING

POSING AS A SERVICE ENGINEER AND PLANTING A CHIP THAT RECORDS DATA IN A LEGITIMATE CREDIT CARD READER

DATA DIDDLING

CHANGING DATA TO INCORRECTLY UPDATE KEY SYSTEM DATA

DATA LEAKAGE

UNAUTHORIZED COPYING OF COMPANY DATA

DENIAL OF SERVICE ATTACK

ATTACKER SENDS SO MANY E-MAIL BOMBS OR WEB REQUESTS THE WEB SERVERS E-MAIL IS OVERLOADED AND SHUTS DOWN



HACKING

UNAUTHORIZED ACCESS MODIFICATION OR USE OF AN COMPUTER SYSTEM



IP ADDRESS SPOOFING

CREATING INTERNET PROTOCOL PACKETS TO HIDE IDENTITY OR SPOOF ANOTHER SYSTEM



IDENTITY THEFT

ASSUMING ONES IDENTITY FOE ECONOMIC GAIN

KEY LOGGER

SOFTWARE THAT RECORDS KEYSTROKES, E-MAILS, WEBSITES VISITED



LEBANESE LOOPING

INSERTING A SLEVE INTO A ATM THAT PREVENTS IT FROM EJECTING THE CARD. TRICKING THE PERSON WHO ENTERS IT INTO ENTERING THIER PIN. WHEN PERSON LEAVES THEIF USES CARD

PASSWORD CRACKING

PENETRATES A SYSTEMS DEFENSE, STEALS FILE CONTAINING PASSWORDS, GAINS ACCESS TO SYSTEM

PHARMING

REDIRECTING WEBSITE TRAFFIC INTO A SPOOFED WEBSITE

PHISHING

MESSAGE POSING AS LEGIT COMPANY TO OBTAIN INFO

PHREAKING

USING PHONE LINES TO TRANSMIT DATA TO ACCESS STEAL AND DESTROY DATA



POD SLURPING

USING A DEVICE TO DOWNLOAD UNAUTHORIZED DATA FROM A COMPUTER



POSING

FAKE BUSINESS, SELL PRODUCT, DONT DELIVER,

PRETEXTING

INVENTED SCENARIO TO GET INFO

SALAMI

STEALING TINY SLICES OF $ FROM MULTIPLE ACCOUNTS

SCAVENGING/DUMPSTER DIVING

SEARCHING FOR DOCUMENTS TO GAIN ACCESS TO FINANCIAL INFORMATION

SHOULDER SURFING

LOOKING OVER SHOULDERS TO GET ATM PASSWORD ID ECT

SKIMMING

DOUBLE SWIPING IN A LEGITIMATE TERMINAL OR COVERTLY SWIPING IN A CARD READER THAT RECORDS CREDIT CARD DATA

SOCIAL ENGINEERING

TRICKS USED TO GAIN ACCESS TO A BUILDING COMPUTER SERVER OR NETWORK TO GAIN ACCESS TO A SYSTEM

SPYWARE

SOFTWARE THAT MONITORS COMPUTER USAGE AND SENDS TO SOMEONE ELSE WITHOUT THE USERS PERMISSION



STEGANOGRAPHY

MERGE CONFIDENTIAL INFO WITH A SEEMINGLY HARMLESS FILE, PASSWORD PROTECT THE FILE AND SEND IT ANYWHERE IN THE WORLD. WHEN INFO IS UNLOCKED THE HOST FILE CAN STILL BE HEARD OR VIEWED

TRAP DOOR

SET OF COMPUTER INSTRUCTIONS THAT ALLOWS THE USER TO BYPASS SYSTEM CONTROLS

TROJAN HORSE

SET OF UNAUTHORIZED COMPUTER INSTRUCTIONS IN A OTHERWISE PROPERLY FUNCTIONING PROGRAM

TYPOSQUATTING/URL HIJACKING

SETTING UP SIMILARLY NAMED WEBSITES

VIRUS

SEGMENT OF EXECUTEABLE CODE THAT ATTACHES ITSELF TO AN APPLICATION PROGRAM & MAKES UNAUTHORIZED CHANGES TO THE WAY THE SYSTEM OPERATES



WORM

PROGRAM (NOT A CODE SEGMENT) HIDDEN IN A HOST PROGRAM AND COPIES ITSELF & TRANSMITS ITSELF TO OTHER SYSTEMS

VISHING

LIKE PHISHING BUT USER ENTERS CONFIDENTIAL DATA BY PHONE