Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
28 Cards in this Set
- Front
- Back
Phishing |
Sending fraudulent emails that seem to come from legitimate sources
Attempt to capture private information (Chico state emails) |
|
Keystroke loggers |
-Monitor and record key strokes -can be both hardware and software -companies use it to track employee emails |
|
Sniffing |
Capturing and recording network traffic and often used by hackers to intercept information |
|
Spoofing |
Attempts to gain access to a network by posing as an authorized user. |
|
Black hat hacker |
experienced hacker, purpose to break in or bypass internet security. |
|
White hat hacker |
Works for companies to make sure no one can break on or hack into the system |
|
Script kiddy |
A juvenile hacker that used scrips or programs developed by sophisticated hackers |
|
Third level of security is? |
Corporate network |
|
What are three well known worms? |
Code Red, Melissa, Sasser |
|
Type of program used to release a Trojan hoarse |
Logic Bomb |
|
Ky size |
Between 32 and 1168 bits |
|
Main types of encryption |
Asymmetric (public) and symmetric
|
|
Three factors that are critical for security |
Authentication Confirmation nonrepudiation
|
|
Client server model |
When multiple computers are set up to one client server, for example: multiple computes can print to one printer or on email client server. |
|
Attenuation |
Loss of power or signal as it travels from the sending device to the receiver device. |
|
Two types of architecture |
Peer to peer and client/server network |
|
What is a client? |
A computer that is designed to request information from a server. |
|
WAN |
Wide area network Deals with wide geographical area |
|
MAN |
Metropolitan area network Usually spanning a city |
|
BUS Typology |
all computers connected to a single cable |
|
Star typology |
All computers connected to a central device |
|
RING Typology |
All computers are connected on the shape of a ring and information always goes one direction |
|
Hybrid typology |
|
|
Ethernet |
Cable internet |
|
Three most commonly used wire media |
Twisted pair wiring coaxial cable fiber optic |
|
Coaxial cable |
Carries a wide range of frequencies with low signal loss |
|
Fiber optics |
Fastest internet: transmission of information as light passes through glass wire or fiber. |
|
Starting date of the internet |
1969 |