• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back
Spam
Unsolicited mass mailings via e-mail, newsgroups, instant messaging, and cell phones to a large group of recipients
Rootkits
Computer software that hides the presence and activity of intruders. Used in combination with Trojan software, hackers can change system settings and use the computer without the user or monitoring software detecting it
Rootkits
Sony BMG Music Entertainment use to disguise digital rights management software
Viruses
Software that is capable of executing an unwanted action on the victim's computer and has a mechanism for replicating itself inside other computers that come in contact with the infected machine
Worms
A more dangerous evolution of viruses, worms are self-propagating, meaning they do not need any intervention from the victim – such as clicking on an infected software attachment in an email – to transfer themselves to other computers.
Trojan Horse
It claims to do one thing but instead does damage when you run it. It installs itself on the user's computer when they click on a link or a disguised computer file or attachment. Once installed, the software can be controlled remotely by hackers to extract passwords and other sensitive information. It can also be used to create zombie, for forwarding advertising spam, phishing e-mails and Trojan software to millions of other computers on the Internet.
Computer Intrusions or Hacking
Unauthorized access to a computer system, whether it be manual such as using a stolen password or automated through software to bypass network security protection via the Internet
Man-in-the-Middle Attack
Criminals create bogus sites that are capable of communicating directly with legitimate sites in real time. Victims access their actual accounts, perhaps even using a hardware token or other one-time password device, but do it through the man-in-the-middle servers that capture all their information. These servers can even force the legitimate site to keep secure sessions open after the victim has logged off, allowing criminals to access the account themselves and withdraw money.
Denial-of-Service Attack
Inundating a computer, router or other networked device with more packets of data than it can process, effectively blocking any legitimate requests to access the system
Botnets
Networked groups of compromised computers or zombies that are controlled by hackers, usually through Trojan software to deliver spam, phishing, and DoS attacks (estimated one million out there)
Phishing
Software that tricks Internet users into divulging their personal information for use or resale by criminals who can profit from the information, e.g., fake emails and websites that look like real and from legitimate sources
Intrusion Detection Systems
Full-time, real-time monitoring tools placed at most vulnerable points of corporate networks to detect and deter intruders
Anti-Virus Software
Checks computer systems and drives for presence of computer viruses
Security Training
Teaching computer users not to click on communications or software that they are not expecting to receive
Risk Assessment
A process whereby risks are identified, assessed for their impact and likelihood and then, depending on their seriousness, reduced to an acceptable level
Disaster recovery
is intended to provide coverage for really series incidents such as fire or flood.
Businesses should have back-up routine
1. Giving one person the main responsibility for backing up, and designating a second to cover for absence
2. Using a different tape or disk to back up each day of the week and have a schedule for rotating them
3. Keeping the backup secure, preferably off-site from the main business premise