Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
24 Cards in this Set
- Front
- Back
Social engineering |
using social skills to get computer usersto write information that allows a hacker to access an information system or itdata |
|
Dumpster diving |
going through the trash of an organizationto find secret or confidential information including information needed toAccess an information system or its data |
|
Cyber terrorist
|
someone who intimidate or Coerces A government organization to advance political or social objectives by launching computer-based attacks against computers and networks in the information stored on them |
|
Identity theft |
a crime in which an imposter obtains key pieces of personal identification information such as social insurance number or a drivers license number to impersonate someone else |
|
Hacker |
a person who enjoys computer technology and spends time learning and using computer systems umber |
|
Criminal hacker (cracker) |
a computer savvy person who attempts to gain an authorized or illegal access to computer systems to steal passwords corrupt files and programs or even transfer money |
|
Script bunny |
a cracker with little technical savvy who download programs called Scripts which automate the job of breaking into computers |
|
Insider |
an employee disgruntled or otherwise working solo or in concert with outsiders to compromise corrupt systems |
|
Spyware |
software that is installed on a personal computer to intercept or take partial control over the user interaction with the computer without knowledge or permission of the user |
|
Password sniffer |
a small program hidden in a network or a computer system that record identification numbers and passwords |
|
Keystroke loggers |
software or hardware programmed to send a list of keystrokes typed by a user to a malicious person |
|
Software piracy |
the act of an authorized copying or distribution of copyrighted software |
|
Intrusion detection system (IDS) |
software that monitor system and network resources and notifies network security personnel when it senses a possible intrusion |
|
Security dashboard |
software to provide a comprehensive display on a single computer screen of all the vital data related to an organization and security defenses including threat exposures policy compliance an incident alert |
|
Antivirus program |
software that runs in the background to protect your computer from dangerous looking on the Internet and other possible sources of infected files |
|
Platform for privacy preferences (P3P) |
a screening technology in web browsers that shield users from websites but don't provide the level of privacy protection they desire |
|
Ergonomics |
the science of designing machines products and systems to maximize the safety comfort inefficiency of the people who use them |
|
Code of ethics |
a code that state the principles and court values that are you sensual to a set of people and that therefore govern their behavior |
|
Logic bomb |
a type of Trojan horse that executes one specific conditions occur triggers for logic bombs can include a change in a file by a particular series of keystrokes or at a specific time or date |
|
Rootkit |
a set of programs that enable it's user to gain administrators level access to a computer or network once installed the attacker can gain full control of the system and even obscure the presence of the root kit from legitimate system administrators |
|
Trojan horse |
eight malicious program that disguises itself is a useful applications or game and purposefully does something the user does not expect |
|
Variant |
a modified version of a virus that is produced by the viruses author or another person by amending the original virus code |
|
Virus |
computer program file capable of attaching two desks or other files and replicating itself repeatedly typically without the users knowledge or permission |
|
Worm |
parasitic computer program that replicates but the worm like viruses do not infect other computer program files a worm can send the copies to other computers via network |