Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
Spam
|
Unsolicited mass mailings via e-mail, newsgroups, instant messaging, and cell phones to a large group of recipients
|
|
Rootkits
|
Computer software that hides the presence and activity of intruders. Used in combination with Trojan software, hackers can change system settings and use the computer without the user or monitoring software detecting it
|
|
Rootkits
|
Sony BMG Music Entertainment use to disguise digital rights management software
|
|
Viruses
|
Software that is capable of executing an unwanted action on the victim's computer and has a mechanism for replicating itself inside other computers that come in contact with the infected machine
|
|
Worms
|
A more dangerous evolution of viruses, worms are self-propagating, meaning they do not need any intervention from the victim – such as clicking on an infected software attachment in an email – to transfer themselves to other computers.
|
|
Trojan Horse
|
It claims to do one thing but instead does damage when you run it. It installs itself on the user's computer when they click on a link or a disguised computer file or attachment. Once installed, the software can be controlled remotely by hackers to extract passwords and other sensitive information. It can also be used to create zombie, for forwarding advertising spam, phishing e-mails and Trojan software to millions of other computers on the Internet.
|
|
Computer Intrusions or Hacking
|
Unauthorized access to a computer system, whether it be manual such as using a stolen password or automated through software to bypass network security protection via the Internet
|
|
Man-in-the-Middle Attack
|
Criminals create bogus sites that are capable of communicating directly with legitimate sites in real time. Victims access their actual accounts, perhaps even using a hardware token or other one-time password device, but do it through the man-in-the-middle servers that capture all their information. These servers can even force the legitimate site to keep secure sessions open after the victim has logged off, allowing criminals to access the account themselves and withdraw money.
|
|
Denial-of-Service Attack
|
Inundating a computer, router or other networked device with more packets of data than it can process, effectively blocking any legitimate requests to access the system
|
|
Botnets
|
Networked groups of compromised computers or zombies that are controlled by hackers, usually through Trojan software to deliver spam, phishing, and DoS attacks (estimated one million out there)
|
|
Phishing
|
Software that tricks Internet users into divulging their personal information for use or resale by criminals who can profit from the information, e.g., fake emails and websites that look like real and from legitimate sources
|
|
Intrusion Detection Systems
|
Full-time, real-time monitoring tools placed at most vulnerable points of corporate networks to detect and deter intruders
|
|
Anti-Virus Software
|
Checks computer systems and drives for presence of computer viruses
|
|
Security Training
|
Teaching computer users not to click on communications or software that they are not expecting to receive
|
|
Risk Assessment
|
A process whereby risks are identified, assessed for their impact and likelihood and then, depending on their seriousness, reduced to an acceptable level
|
|
Disaster recovery
|
is intended to provide coverage for really series incidents such as fire or flood.
|
|
Businesses should have back-up routine
|
1. Giving one person the main responsibility for backing up, and designating a second to cover for absence
2. Using a different tape or disk to back up each day of the week and have a schedule for rotating them 3. Keeping the backup secure, preferably off-site from the main business premise |