Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
30 Cards in this Set
- Front
- Back
ADWARE |
SPYWARE THAT CAUSES SOFTWARE ADS TO POP UP ON A MONITOR. COLLECTS SPENDING AND WEB SURFING INFO
|
|
CHIPPING |
POSING AS A SERVICE ENGINEER AND PLANTING A CHIP THAT RECORDS DATA IN A LEGITIMATE CREDIT CARD READER |
|
DATA DIDDLING |
CHANGING DATA TO INCORRECTLY UPDATE KEY SYSTEM DATA |
|
DATA LEAKAGE |
UNAUTHORIZED COPYING OF COMPANY DATA |
|
DENIAL OF SERVICE ATTACK |
ATTACKER SENDS SO MANY E-MAIL BOMBS OR WEB REQUESTS THE WEB SERVERS E-MAIL IS OVERLOADED AND SHUTS DOWN |
|
HACKING |
UNAUTHORIZED ACCESS MODIFICATION OR USE OF AN COMPUTER SYSTEM |
|
IP ADDRESS SPOOFING |
CREATING INTERNET PROTOCOL PACKETS TO HIDE IDENTITY OR SPOOF ANOTHER SYSTEM |
|
IDENTITY THEFT |
ASSUMING ONES IDENTITY FOE ECONOMIC GAIN |
|
KEY LOGGER |
SOFTWARE THAT RECORDS KEYSTROKES, E-MAILS, WEBSITES VISITED |
|
LEBANESE LOOPING |
INSERTING A SLEVE INTO A ATM THAT PREVENTS IT FROM EJECTING THE CARD. TRICKING THE PERSON WHO ENTERS IT INTO ENTERING THIER PIN. WHEN PERSON LEAVES THEIF USES CARD |
|
PASSWORD CRACKING |
PENETRATES A SYSTEMS DEFENSE, STEALS FILE CONTAINING PASSWORDS, GAINS ACCESS TO SYSTEM |
|
PHARMING |
REDIRECTING WEBSITE TRAFFIC INTO A SPOOFED WEBSITE |
|
PHISHING |
MESSAGE POSING AS LEGIT COMPANY TO OBTAIN INFO |
|
PHREAKING |
USING PHONE LINES TO TRANSMIT DATA TO ACCESS STEAL AND DESTROY DATA |
|
POD SLURPING |
USING A DEVICE TO DOWNLOAD UNAUTHORIZED DATA FROM A COMPUTER |
|
POSING |
FAKE BUSINESS, SELL PRODUCT, DONT DELIVER, |
|
PRETEXTING |
INVENTED SCENARIO TO GET INFO |
|
SALAMI |
STEALING TINY SLICES OF $ FROM MULTIPLE ACCOUNTS |
|
SCAVENGING/DUMPSTER DIVING |
SEARCHING FOR DOCUMENTS TO GAIN ACCESS TO FINANCIAL INFORMATION |
|
SHOULDER SURFING |
LOOKING OVER SHOULDERS TO GET ATM PASSWORD ID ECT |
|
SKIMMING |
DOUBLE SWIPING IN A LEGITIMATE TERMINAL OR COVERTLY SWIPING IN A CARD READER THAT RECORDS CREDIT CARD DATA |
|
SOCIAL ENGINEERING |
TRICKS USED TO GAIN ACCESS TO A BUILDING COMPUTER SERVER OR NETWORK TO GAIN ACCESS TO A SYSTEM |
|
SPYWARE |
SOFTWARE THAT MONITORS COMPUTER USAGE AND SENDS TO SOMEONE ELSE WITHOUT THE USERS PERMISSION |
|
STEGANOGRAPHY |
MERGE CONFIDENTIAL INFO WITH A SEEMINGLY HARMLESS FILE, PASSWORD PROTECT THE FILE AND SEND IT ANYWHERE IN THE WORLD. WHEN INFO IS UNLOCKED THE HOST FILE CAN STILL BE HEARD OR VIEWED |
|
TRAP DOOR |
SET OF COMPUTER INSTRUCTIONS THAT ALLOWS THE USER TO BYPASS SYSTEM CONTROLS |
|
TROJAN HORSE |
SET OF UNAUTHORIZED COMPUTER INSTRUCTIONS IN A OTHERWISE PROPERLY FUNCTIONING PROGRAM |
|
TYPOSQUATTING/URL HIJACKING |
SETTING UP SIMILARLY NAMED WEBSITES |
|
VIRUS |
SEGMENT OF EXECUTEABLE CODE THAT ATTACHES ITSELF TO AN APPLICATION PROGRAM & MAKES UNAUTHORIZED CHANGES TO THE WAY THE SYSTEM OPERATES |
|
WORM |
PROGRAM (NOT A CODE SEGMENT) HIDDEN IN A HOST PROGRAM AND COPIES ITSELF & TRANSMITS ITSELF TO OTHER SYSTEMS |
|
VISHING |
LIKE PHISHING BUT USER ENTERS CONFIDENTIAL DATA BY PHONE |