Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
11 Cards in this Set
- Front
- Back
trojan horse
|
hides within or looks like legitimate program until triggered, does not replicate itself on other computers
|
|
Worm
|
Program that copies itself reapeatedly, using up system resources and possibly shutting down the system
|
|
Payload
|
(destructive event) that is delivered when you open file, run infected program, or boot computer with infected disk in disk drive.
|
|
Macro/script-types of viruses
|
exploits trust relationship between office and OS-VBscript computing (called VBA in Office)-often as attachments in email
|
|
Virus Signature
|
known specific pattern of virus code. Also called virus infection.
|
|
biometrics
|
device that authenticates a person's identity by translating a personal characteristic, such as a finger print, into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic
|
|
SSL-Secure Sockets Layer
|
-Security technique that provides encryption of all data that passes between a client and an internet server
|
|
Cookie
|
small text file that a Web server stores on a computer. Some Web sites sell or tade information stored in your cookies.
|
|
Encryption
|
process of converting readable data into unreadable characters to prevenet unauthorized access
|
|
Ergonomics
|
an applied science devoted to incorporating comfort, efficiency, and safety into desgn of items in the workspace
|
|
Digital Certificate
|
A notice that guarentees a user or a Web site is legitimate
|