Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
26 Cards in this Set
- Front
- Back
A term originally described any computer enthusiast who lacked formal training |
Hacker |
|
This term has been redefined to identify anyone who gains unauthorized access to a computer system |
Hacker |
|
Anyone who gains access to a computer system without authorization and with the intent to do harm or play pranks |
Cracker |
|
Anyone who gains access to a computer system they are not authorized to access is called a |
Intruder |
|
A software access port to the computer that a Trojan horse has infected |
A backdoor |
|
Denying access to a server by overloading the server with bogus requests |
Denial Of Service (DOS) |
|
A virus created by storing a series of keystrokes known as a "macro" produced by a word-processing software application |
Macro virus |
|
A method of intercepting a network transmission, reading it, and then placing it back on route to it's intended destination |
Man In The Middle (MITM) |
|
A method of Internet fraud that involves using e-mail to steal a person's identity and other sensitive information, such as financial |
Phishing |
|
A method of using previously copied and stored information, such as an IP or MAC address, to establish an unauthorized connection with the destination |
Replay Attack |
|
A type of DoS that consists of spoofing the target address and then pinging the target broadcast address |
Smurf Attack |
|
The manipulation of personnel by the use of deceit to gain security information |
Social Engineering |
|
Fooling the destination by using an IP address other then the true IP address of a source to create a fake identity
|
Spoofing |
|
A program designed to gain access to a computer while pretending to be something else |
Trojan Horse |
|
A software program that can spread easily and rapidly to many different computers
|
Worm |
|
Intrusion Intrusion |
IDS |
|
Intrusion Intrusion Detection or Prevention System System? Requires some form of port monitoring |
IPS
|
|
Intrusion Intrusion Detection or Prevention System System? A reactive security protection system |
IPS
|
|
Intrusion Intrusion Detection or Prevention System System? Detects unauthorized activity and performs some function to stop the activity |
IPS |
|
Intrusion Intrusion Detection or Prevention System System? Microsoft Event Viewer is an example of this system |
IDS |
|
Intrusion Intrusion Detection or Prevention System System? An antivirus software program is an example of this type of system |
IPS |
|
Intrusion Intrusion Detection or Prevention System System? Can generate false positives |
IDS |
|
The method of using an algorithm to encode data is called |
Encryption |
|
The science of encoding data is |
Cryptology |
|
Encrypted data is referred to as |
Cipher Text |
|
An algorithm used to encode data is called a |
Key |