Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
29 Cards in this Set
- Front
- Back
spyware
|
software that secretly gathers information about users while they browse the web.
|
|
adware
|
is a form of spyware that collects information about the user(without the user's consent) to display advertisements in the web browser, based on information it collects from the user's browsing patterns
|
|
phishing
|
sending fraudulent emails that seem to come from legitimate source, such as a bank or university.....
|
|
keyloggers
|
monitor and record keystrokes and can be software or hardware devices.
|
|
cookies
|
small test files with a unique ID tag that are embedded in a web browser and saved on the user's hard drive
|
|
sniffing
|
capturing and recording network traffic, it can be done for legitimate reasons, but hackers use it to intercept infro...
|
|
spoofing
|
attempt to gain access to a network by posing as an authorized user to find sensitive info....
|
|
acceptable use policy
|
a set of rules specifying legal and ethical system use and activities and the consequences of noncompliance
|
|
spam
|
unsolicited email sent for advertising purposes.
|
|
cybersquatting
|
registering, selling, or using a domain name to profit from someone else's trademark
|
|
digital divide
|
computers still aren't affordable for many people.
|
|
virtual organizations
|
networks of independent companies, suppliers, customers, and manufacturers connected via info..tech..
|
|
confidentiality
|
system must not allow disclosing info. to anyone who isn't authorized to access it.
|
|
integrity
|
ensures the accuracy of info. resources in an organization
|
|
availability
|
ensures that computers and networks are operating, and authorized users can access the info..
|
|
fault tolerant systems
|
ensures availability in case of a system failure by using a combination of hardware and software.
|
|
Trojan program
|
contains code intended to disrubt a computer, network, or website and is usually hidden inside popular program.
|
|
backdoor (trap door)
|
a programing routing built into a system by its designer. it enables the designer to bypass system security
|
|
biometric security measures
|
use a physiological element to enhance security measures. these elements r unique to a person....
|
|
multiplexer
|
a hardware device that allows several nodes to share one communication channel.
|
|
centralized processing
|
system, all processing is done at one central computer
|
|
decentralized processing
|
each user, department has its own computer
|
|
distributed processing
|
maintains centralized control and decentralizes operations. processing power is distributed among several locations
|
|
virus
|
consists of self propagating program code that's triggered by a specified time or event...
|
|
denial of service attack
|
floods a network or server with service requests to prevent legitimate user's access t the system..
|
|
bandwidth
|
the amount of data that can be transferred from one point to another in a certain time period, usually one second.
|
|
broadband
|
data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate.
|
|
LAN-local area network
|
connects workstations and peripheral devices that are in close proximity
|
|
WAN-wide area network
|
can span several cities, states, or even countries, and it's usually owned by several different parties
|