Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
23 Cards in this Set
- Front
- Back
Adware:
|
A software program delivers advertising content in a manner that is unexpected and unwanted by the user.
|
|
backdoor:
|
Software code that gives access to a program or a service that circumvents normal security protections.
|
|
botnet:
|
A logical computer network of zombies under the control of an attacker
|
|
Virus:
|
A malicious computer code that, like its biological counterparts, reproduces itself on the same computer
|
|
dumpster diving:
|
The act of digging through trash receptacles to find information that can be useful in an attack.
|
|
Hoax:
|
A False warning
|
|
impersonation
|
An attack that creates a fictitious character and then plays out the role of that person on a victim.
|
|
keylogger:
|
Captures and stores each keystroke that a user types on the computer's keyboard.
|
|
logic bomb:
|
Computer code that lies dormant until it is triggered by a specific logical event
|
|
malware:
|
Software that enters a computer system without the user's knowledge or consent and then performs an unwanted-and usually harmful-action.
|
|
pharming:
|
A phishing attack that automatically redirects the user to a fake site
|
|
phishing:
|
Sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise in a attempt to trick the user into surrendering private information.
|
|
rootkit:
|
A set of software tools used by an attacker to hide the actions or presence of other types of malicious software
|
|
shoulder surfing:
|
Watching an authorized user enter a security code on a keypad
|
|
social engineering:
|
A means of gathering information for an attack by relying on the weaknesses of individuals
|
|
spam:
|
Unsolicited email
|
|
spyware:
|
A general term used to describe software that spies on users by gathering information without consent, thus violating their privacy
|
|
tailgating:
|
The act of unauthorized individuals entering a restricted-access building by following an authorized user.
|
|
trojan:
|
An executable program advertised as performing one activity, but actually does something else ( or it may perform both the advertised and malicious activities)
|
|
vishing:
|
A phishing attack that uses a telephone call instead of using e-mail.
|
|
whaling:
|
a phishing attack that targets only wealthy individuals
|
|
word splitting:
|
Horizontally separating words so that they can still be read by the human eye.
|
|
worm:
|
a malicious program designed to take advantage of a vulnerability in an application or an operating system in order to enter a computer and then self-replicate to other computers.
|