Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
26 Cards in this Set
- Front
- Back
Authentication
|
Determines the identity of the person requesting access.
|
|
Authorization
|
Determines which actions, rights, or privileges the person has based on the verified identify
|
|
Cookies
|
A small amount of data websites leave on the local computer temporarily.
|
|
DOS
|
Denial of service attack.
An attacker sends so much information to the target's computer system that it cannot be successfully processed and causes a crash. |
|
Digital Certificate
|
An electronic document attached to a file certifying that the file is from the organization it claims to be.
|
|
DDOS
|
Distributed denial of service attack.
The attacker creates a botnet through malicious software to deliver a coordinated stream of information requests to a target computer. |
|
Firewall
|
Firewalls prevent unauthorized Internet users from accessing private networks using hardware, software, or a combination of both.
|
|
Intrusion Detection System
|
Designed to detect malicious network traffic.
|
|
Keystroke Logger
|
Software that records your keystrokes and web browsing history.
|
|
Malware
|
Short for malicious software. Is designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems.
|
|
Opt-in Model
|
A business is prohibited from collecting information unless a the customer specifically authorizes it with informed consent.
|
|
Opt-out Model
|
Permits the business to collect personal information until the customer specifically requests that the data not be collected.
|
|
Phishing Attack
|
Involves deception to acquire sensitive information by posing as an official looking email.
|
|
Public-key Encryption
|
Also knows as asymmetric encryption.
|
|
Risk Analysis
|
The process by which an organization weighs the costs of having an asset compromised versus the cost of protecting the asset.
|
|
Risk Mitigation
|
When an organization takes concrete actions against a risk.
|
|
SSL
|
Secure socket layer.
Encrypts and decrypts data between browser and server. Indicated by https:// |
|
Social Engineering
|
An attack where the perpetrator uses social skills to manipulate a legitimate employee into providing confidential company information.
|
|
Spyware
|
Software that collects information about a user without consent.
|
|
Trap Door
|
Allows an attacker access without having to go through security procedures.
|
|
Trojan Horse
|
Software that hide in other computer programs until they are activated.
|
|
Tunnelling
|
Encrypts data packets traveling on a VPN.
|
|
VPN
|
Virtual private network.
A private network that uses a public network to connect users through a client. |
|
Virus
|
Computer code that performs malicious actions by attaching to another program.
|
|
Vulnerability
|
The possibility that a computer system will suffer harm by a threat.
|
|
Worm
|
Computer code that performs malicious actions and will replicate.
|