• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/23

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

23 Cards in this Set

  • Front
  • Back
Adware:
A software program delivers advertising content in a manner that is unexpected and unwanted by the user.
backdoor:
Software code that gives access to a program or a service that circumvents normal security protections.
botnet:
A logical computer network of zombies under the control of an attacker
Virus:
A malicious computer code that, like its biological counterparts, reproduces itself on the same computer
dumpster diving:
The act of digging through trash receptacles to find information that can be useful in an attack.
Hoax:
A False warning
impersonation
An attack that creates a fictitious character and then plays out the role of that person on a victim.
keylogger:
Captures and stores each keystroke that a user types on the computer's keyboard.
logic bomb:
Computer code that lies dormant until it is triggered by a specific logical event
malware:
Software that enters a computer system without the user's knowledge or consent and then performs an unwanted-and usually harmful-action.
pharming:
A phishing attack that automatically redirects the user to a fake site
phishing:
Sending an e-mail or displaying a Web announcement that falsely claims to be from a legitimate enterprise in a attempt to trick the user into surrendering private information.
rootkit:
A set of software tools used by an attacker to hide the actions or presence of other types of malicious software
shoulder surfing:
Watching an authorized user enter a security code on a keypad
social engineering:
A means of gathering information for an attack by relying on the weaknesses of individuals
spam:
Unsolicited email
spyware:
A general term used to describe software that spies on users by gathering information without consent, thus violating their privacy
tailgating:
The act of unauthorized individuals entering a restricted-access building by following an authorized user.
trojan:
An executable program advertised as performing one activity, but actually does something else ( or it may perform both the advertised and malicious activities)
vishing:
A phishing attack that uses a telephone call instead of using e-mail.
whaling:
a phishing attack that targets only wealthy individuals
word splitting:
Horizontally separating words so that they can still be read by the human eye.
worm:
a malicious program designed to take advantage of a vulnerability in an application or an operating system in order to enter a computer and then self-replicate to other computers.