• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/26

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

26 Cards in this Set

  • Front
  • Back

A term originally described any computer enthusiast who lacked formal training

Hacker

This term has been redefined to identify anyone who gains unauthorized access to a computer system

Hacker

Anyone who gains access to a computer system without authorization and with the intent to do harm or play pranks

Cracker

Anyone who gains access to a computer system they are not authorized to access is called a

Intruder

A software access port to the computer that a Trojan horse has infected

A backdoor

Denying access to a server by overloading the server with bogus requests

Denial Of Service (DOS)

A virus created by storing a series of keystrokes known as a "macro" produced by a word-processing software application

Macro virus

A method of intercepting a network transmission, reading it, and then placing it back on route to it's intended destination

Man In The Middle (MITM)

A method of Internet fraud that involves using e-mail to steal a person's identity and other sensitive information, such as financial

Phishing

A method of using previously copied and stored information, such as an IP or MAC address, to establish an unauthorized connection with the destination

Replay Attack

A type of DoS that consists of spoofing the target address and then pinging the target broadcast address

Smurf Attack

The manipulation of personnel by the use of deceit to gain security information

Social Engineering

Fooling the destination by using an IP address other then the true IP address of a source to create a fake identity

Spoofing

A program designed to gain access to a computer while pretending to be something else

Trojan Horse

A software program that can spread easily and rapidly to many different computers

Worm

Intrusion Intrusion
Detection or Prevention
System System?

Only detects unauthorized activity

IDS

Intrusion Intrusion


Detection or Prevention


System System?




Requires some form of port monitoring

IPS

Intrusion Intrusion


Detection or Prevention


System System?




A reactive security protection system

IPS

Intrusion Intrusion


Detection or Prevention


System System?




Detects unauthorized activity and performs some function to stop the activity

IPS

Intrusion Intrusion


Detection or Prevention


System System?




Microsoft Event Viewer is an example of this system

IDS

Intrusion Intrusion


Detection or Prevention


System System?




An antivirus software program is an example of this type of system

IPS

Intrusion Intrusion


Detection or Prevention


System System?




Can generate false positives

IDS

The method of using an algorithm to encode data is called

Encryption

The science of encoding data is

Cryptology

Encrypted data is referred to as

Cipher Text

An algorithm used to encode data is called a

Key