• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/33

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

33 Cards in this Set

  • Front
  • Back

What is a computer network?

A group of computers connected with eachother, through wires, optical fibers of links so various devices can communicate with each other

What are 6 threats to a computer network?

1. Malware


2. Phishing


3. Bot Net


4. Spam


5. Denial of service attacks


6. Industrial espionage

What is malware?(malicious software)

Malicious software designed to change computer settings, erase software cause errors etc. It uses malicious ways to install itself to your computer

What are 5 types of malware?

1. Logic bomb


2. Virus


3. Worm


4. Trojan horse


5. Spyware

What is logic bomb?

A piece of code inserted into an operating system that implements a malicious function after a period of time, or specific conditions are met

What is a Virus?

A program designed to cause damage, steal information, modify data, send emails etc. Or a combination of these

What is a Worm?

A destructive self replicating program containing code capable to gain access into computers or networks. Once inside the worm hams by deleting, modifying, distributing or manipulating data

What's is a Trojan Horse?

A program that appears to be something safe but is performjng tasks such as getting access to you computer

What is a Keylogger?

Alternatively refered to a as a key stroke logger is a software program or hardware device that is used to monitor and logg each key a user types. The installer can veiw all keys typed by the user.

What is Adware?

A software that displays unwanted advertisements. They tend to bombard your device you device with pop up adds, change your homepage and add Spyware

• What is Phishing?

Used to describe a malicious group of individuals who scam users by creating fake emails and web pages to collect users banking and login info

What is Pharming?

Is creating a simular webpage to a company's web page to decieve visitors thinking that it is another company's web page. However when login info etc are entered, they are captured for the creators use

What is Bot Net? (Zombie network.

A group of infected computers controls my 1 or more persons used to perform malicious tasks impossible for a single computer to do

What is Spam?

The use of electronic messaging systems to send out unwanted and unrequested messages and emails in bulk

Denial of Service Attack

Method of attacking networks by sending it an abnormally high number of requests causing it to slow down fail, usually send by zombie and worm computers

What is Identify theft?

Illegally obtained a person's personal information such as name, address, date of birth, bank info etc. And use this information to pose as that person or sell their information

What is easedroppjng?

Electronic attack where digital conversations are intercepted by which they weren't intended for.

What's industrial espionage?

Pccasion where one company steal information from another company with which it is competing

Credit card fraud

Illegally using another person's credit card for purchases without their permission.

Methods of securing computer networks

--->

What are firewalls?

They work by blocking or refreshing network ports to prevent unauthorized access. A software or hardware utility that filters data going in and out the network

Antivirus

Also referred to as AVS (anti-virus software) software utility designed to protect your computer from viruses, if a virus is detected it displays are warning asking what action is to be taken

Anti spyware

Similar to an anti-virus, used to block and prevent malware infections of computers by monitoring emails, websites etc.

Network monitors

A system used to monitor networks and notify administrators when a device fails or outtage occurs

Training employees

Edu acting employees of how to apsafeky use a network so that makware are not downloaded or spread

Locks (computer locks)

Able to keep laptops and desktops computers secured to the desk so that persons cannot steal any component

Security Guard

A person whose job is a guard a place for and make sire the people are not harmed

Surveillance camera

A video camera used to observe a location used to check if unauthorized persons are gaining access to a buiding or room

Motion detector

A sensor that detects physical kinetic movements on a device within an environment in real time.

Keypad

A device with a set of buttons or keys used to enter codes to gain access to a place

Encrytion

Process of encoding messages so that ut can only be dead by the sender and intended receiver

Username and password

A undername is a unique name used to identify someone on a computer system. It is usually paired with a password together they are referred to as a login. Passwords are s string of characters kept secret and used for authenticating a user on a computer system.

Turnkey solutions

Easily implemented pre-made ready to be used system that can be used in current business processes. They prevent identity theft and keep their networks secure. Information provided by social media sites will also be stored secure and business will be alerted if there is any suspicious activity in any of the accounts.