• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back

Social engineering

using social skills to get computer usersto write information that allows a hacker to access an information system or itdata

Dumpster diving

going through the trash of an organizationto find secret or confidential information including information needed toAccess an information system or its data

Cyber terrorist

someone who intimidate or Coerces A government organization to advance political or social objectives by launching computer-based attacks against computers and networks in the information stored on them

Identity theft

a crime in which an imposter obtains key pieces of personal identification information such as social insurance number or a drivers license number to impersonate someone else

Hacker

a person who enjoys computer technology and spends time learning and using computer systems umber

Criminal hacker (cracker)

a computer savvy person who attempts to gain an authorized or illegal access to computer systems to steal passwords corrupt files and programs or even transfer money

Script bunny

a cracker with little technical savvy who download programs called Scripts which automate the job of breaking into computers

Insider

an employee disgruntled or otherwise working solo or in concert with outsiders to compromise corrupt systems

Spyware

software that is installed on a personal computer to intercept or take partial control over the user interaction with the computer without knowledge or permission of the user

Password sniffer

a small program hidden in a network or a computer system that record identification numbers and passwords

Keystroke loggers

software or hardware programmed to send a list of keystrokes typed by a user to a malicious person

Software piracy

the act of an authorized copying or distribution of copyrighted software

Intrusion detection system (IDS)

software that monitor system and network resources and notifies network security personnel when it senses a possible intrusion

Security dashboard

software to provide a comprehensive display on a single computer screen of all the vital data related to an organization and security defenses including threat exposures policy compliance an incident alert

Antivirus program

software that runs in the background to protect your computer from dangerous looking on the Internet and other possible sources of infected files

Platform for privacy preferences (P3P)

a screening technology in web browsers that shield users from websites but don't provide the level of privacy protection they desire

Ergonomics

the science of designing machines products and systems to maximize the safety comfort inefficiency of the people who use them

Code of ethics

a code that state the principles and court values that are you sensual to a set of people and that therefore govern their behavior

Logic bomb

a type of Trojan horse that executes one specific conditions occur triggers for logic bombs can include a change in a file by a particular series of keystrokes or at a specific time or date

Rootkit

a set of programs that enable it's user to gain administrators level access to a computer or network once installed the attacker can gain full control of the system and even obscure the presence of the root kit from legitimate system administrators

Trojan horse

eight malicious program that disguises itself is a useful applications or game and purposefully does something the user does not expect

Variant

a modified version of a virus that is produced by the viruses author or another person by amending the original virus code

Virus

computer program file capable of attaching two desks or other files and replicating itself repeatedly typically without the users knowledge or permission

Worm

parasitic computer program that replicates but the worm like viruses do not infect other computer program files a worm can send the copies to other computers via network