• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/53

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

53 Cards in this Set

  • Front
  • Back

botnet

A large group of software programs used to launch coordinated DoS attacks

boot-sector viruses

Viruses that are often launched from infected USB drives left in a computer

logical ports

Firewalls work by closing ___________ in your computer.

denial-of-service

An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a ______________ attack.

spear phishing

A technique that uses illegally obtained information about individuals to perform targeted attacks in the hopes of getting them to reveal sensitive information

incremental backup

A backup of only the files on your computing device that have been created (or changed) since the last backup

scareware

Software that pretends your computer is infected with a virus to entice you into spending money on a solution




•Type of malware

phishing

A social engineering technique in which you send people an e-mail for the purpose of inducing them into revealing sensitive information

cookies

Small text files that some websites automatically store on your computer’s hard drive

types of cyber crimes

•Fourcommon categories of complaints received were FBI-related scams, identitytheft, nonauction/non-deliveryof merchandise, and advance fee fraud.


•othercomplaints received involved equally serious matters such as computerintrusions (hacking), child pornography, and blackmail.

virus categories

Boot-sector viruses- execute when a computer boots up


Logic Bombs/Time Bombs-execute when certain conditions or dates are reached


Worms-spread on their own with no human interaction needed


Script and macro viruses- series of commands with malicious intent


Email viruses- spread as attachments to email, often using address books


Encryption viruses- hold files hostage by encrypting them, ask for ransom to unlock

Encryption viruses

hold files hostage by encrypting them, ask for ransom to unlock

slealth viruses

temporarily erase their code from thefiles where they reside and hide in the active memory of the computer

zombie

-computerthat a hacker controls




-oftenused to launch denial-of-service attacks on other computers

backdoor programs and rootkits

•Backdoorprograms and rootkits areprograms that allow hackers to gain access to your computer and take almostcomplete control of it without your knowledge.




rootkits-set of software tools used by an attacker to hide the actions or presence of other types of malicious software




backdoor programs-software code that gives access to a program or a service that circumvents normal security protections

denial-of-service attacks

-legitimate users are denied access to a system bc a hacker is repeatedlymaking requests of that system through a computer the hacker has taken over as a zombie.


-computercan handle only a certain number of requests for information at one time. Whenit is flooded with requests, it shuts down and refuses to answer any requestsfor information, even if the requests are from a legitimate user.

firewall

•softwareprogram or hardware device designed to protect computers from hackers.




•Windows, security suites (Norton, McAfee,etc), andOS X include firewalls





password strength

•Operating systems have built-inpassword protection




•Thereare many password generators available for free, such as the Strong PasswordGenerator.




•Youcan use online password strength testers, such as the Password Meter, toevaluate your passwords.

spyware

•anunwanted program that downloads with other software from the Internet and runsin the background.




•Spywaretransmits information about you.


•Manyspyware programs use tracking cookies.•A keystrokeloggerprogram monitors keystrokes.






WindowsDefender- scans your system for spyware and other unwanted software.

steps of an system development life cycle

1.Problem/opportunity identification- Corporationsform a development committee to evaluate proposals.




2. Analysis- Analystsexplore the problem, develop a program specification, define user requirements,and recommend a plan of action.




3. Design-A plan, using flowcharts and data-flowdiagrams, helps programmers




4. Development




5. Testing & Installation-ensure it works properly




6. Maintenance & Evaluation- Programperformance is monitored to determine whether the program is meeting the needsof end users.



life cycle of a program

1. describe problem


2.make plan-algorithm development


3.coding


4. debugging


5.testing and documentation

algorithm

•Programmers handlecomplex algorithmsØListof choices


ØDecisionpoints:


•Binarydecisions-Can be answered in either yes (true)or no (false)


•Loops-•Aquestion is asked. If the answer is yes, actions are performed. Once the actionshave finished, the question is asked again, creating a loop. When the answer isno,the algorithm moves to the first step that follows the loop.

top-down design

•Problem isbroken into series of high-leveltasks




•Detailed subtasks created from high-level tasks




•Continue until steps are close toprogramming language commands

how top-down design is used in programming

(a) Atop-down design is applied to the highest level of task in our parking garageexample,




(b)the tasks are further refined into subtasks, and




(c)subtasks are refined into a sequence of instructions—an algorithm.

compiling a program

•isthe process by which code is converted into machine language—the language theCPU can understand (1s and 0s).




•aprogram that understands bot syntax and programming language and the exactstructure of the CPU.




An interpreter translates the source codeinto an intermediate form, line by line. Each line is executed as it’stranslated. The finished program runs faster than an interpreter

The life cycle of a program begins with describing a problem and making a plan. Then the PDLC requires

coding, debugging, and testing.

A visual representation of an algorithm is represented by

a flowchart

In object-oriented analysis, classes are defined by their

data and methods

design phase

The step of the SDLC in which we document the transfer of data from the point where it enters the system to its final storage

Selecting the right programming language for a project depends on

-who you have working for you and what they know.




-the final requirements for performance and space used.



-the environment of the finished project.

An IDE is a tool that facilitates

compiling.




editing.



debugging.

advantages of Java

-Java is architecture neutral.




-Java needs to compile only once prior to distribution.




-Java supports network communications.

HTML5 features helpful new tags like

< audio > and < video >

What is TRUE about XML?

XML enables designers to define their own data-based tags.

TCP

is a connection-oriented Transport Layer protocol. It provides reliable data delivery services in the TCP/IP environment.

TCP protocol tasks

Internet Protocol (IP)


Transmission Control Protocol (TCP)


User Datagram Protocol (UDP)


Internet Control Message Protocol (ICMP)


Address Resolution Protocol (ARP)


File Transfer Protocol (FTP)


TelnetSimple Mail Transfer Protocol (SMTP)

Internet Protocol (IP)

is an unreliable, connectionless Network Layer protocol. It provides information about how and where data should be delivered. IP is responsible for the logical addressing and routing of the packet in the TCP/IP environment.

Internet Control Message Protocol (ICMP)[Network Layer TCP/IP protocol]

______ ,which is a Network layer TCP/IP protocol, notifies the sender that something has gone wrong in the transmission process and that packets were not delivered. It has no error control. It simply reports which networks are unreachable or which packets were discarded because the TTL (Time to Live) expired.

Transport

The ____________ layer of the OSI model ensures accurate delivery of data. It solves transmission problems and provides error-free reassembly of the data.

Physical layer

The _____________ layer of the OSI model transmits and receives signals. It manages the computer's interface to the network medium. It specifies the specific details of the cables, network adapters and connectors.

Network layer

The ____________ layer of the OSI model handles addressing messages for delivery. This layer translates logical network addresses and names into their physical counterparts. It determines the best route based on network conditions and handles the transfer of data on these routes. It permits packets from one kind of medium to traverse another kind of medium.

Beta Version

A version of the software that's still under development. Many beta versions are available for a limited trial period and are used to help the developers correct any errors before they launch the software on the market.

Internet Protocol

Internet Protocol (IP)A protocol used in combination with TCP or UDP that enables packets to reach a destination on a local or remote network by using dotted decimal addressing.

Source code is computer code ________.

as written by humans

social engineering

means of gathering info for an attack by relying on the weakness of individuals

Fourth-generation language (4GL)

Programming languages that are easier to use than high-level languages such as BASIC, COBOL, or FORTRAN. They are also known as nonprocedural, natural, or very high-level languages.

Machine Languages (aka first-generation languages)

A programming language in which instructions are expressed in the binary code of the computer.

Flowchart

A diagram (visual representation) that shows step-by-step progression (or patterns) through a procedure or system (such as an Algorithm) using connecting lines and a set of conventional symbols.

second-generation language (2GL)

Also known as an assembly language. Second-generation languages deal directly with system hardware but provide acronyms that are easier for human programmers to work with.

image backupback

System image backupback up the entire system disk, you must perform a system image backup. - It is a separate backup of the computer's system disk and the reserved partition that Windows 7 creates on the disk during installation Unlike the file and folder backup, which simply copies files to a compressed archive, a system image backup saves each bloc of the selected targets to a virtual hard disk (VHD) file on the backup device

logical port blocking

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as __________.

Internet Control Message Protocol (ICMP)

Protocol in which messages consist of a single packet and are connectionless. ICMP packets determine connectivity between two hosts.

User Datagram Protocol (UDP)

Part of the TCP/IP protocol suite, a connectionless protocol that is an alternative to TCP.