Chapter 09: Network and Internet Security Flashcards

1
Q

antivirus software

A

Software used to detect and eliminate computer viruses and other types of malware. (p369)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Biometric access systems

A

An access control system that uses one unique physical characteristic of an individual (such as a fingerprint, a face, veins, or a voice) to authenticate that individual. (p354)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

bot

A

A computer that is controlled by a hacker or other computer criminal. (p364)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

botnet

A

A group of bots that are controlled by one individual. (p364)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

BYOD

A

Bring Your Own Device (p363)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

code of conduct

A

Guidelines of acceptable computer use for a school, business, or organization (p348)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

computer crimes

A

Any illegal act involving a computer. (p347)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Computer sabotage

A

An act of malicious destruction to a computer or computer resource. (p364)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

computer virus

A

A software program installed without the user’s knowledge and designed to alter the way a computer operates or to cause harm to the computer system. (p365)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

computer worm

A

A malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers. (p366)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

cyberbullying

A

Children or teenagers bullying other children or teenagers via the Internet. (p381)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

cyberstalking

A

Repeated threats or harassingbehavior between adults carried out via e-mail or another Internet communications method. (p381)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

denial of service (DoS) attack

A

An act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function. (p367)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

digital certificate

A

A group of electronic data that can be used to verify the identity of a person or organization; includes a key pair that can be used for encryption and digital signatures (also called a digital ID). (p379)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

digital ID

A

A group of electronic data that can be used to verify the identity of a person or organization; includes a key pair that can be used for encryption and digital signatures (also called a digital certificate). (p379)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

digital signature

A

A unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been changed since it was signed. (p380)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

distributed denial of service (DDoS) attack

A

A denial of service (DoS) attack coming from many computers at once, often from a botnet. (p368)

18
Q

dot cons

A

A fraud or scam carried out through the Internet. (p370)

19
Q

Encryption

A

A method of scrambling the contents of an e-mail message or a file to make it unreadable if an unauthorized user intercepts it. (p358)

20
Q

firewall

A

A collection of hardware and/or software intended to protect a computer or computer network from unauthorized access. (p356)

21
Q

Hacking

A

Using a computer to break into another computer system. (p348)

22
Q

Identity theft

A

Using someone else’s identity to purchase goods or services, obtain new credit cards or bank loans, or otherwise illegally masquerade as that individual. (p372)

23
Q

Malware

A

Any type of malicious software. (p364)

24
Q

Online auction fraud

A

When an item purchased through an online auction is never delivered after payment, or the item is not as specified by the seller. (p376)

25
Q

Passwords

A

A secret combination of characters used to gain access to a computer, computer network, or other resource. (p352)

26
Q

Pharming

A

The use of spoofed domain names to obtain personal information in order to use that information in fraudulent activities. (p375)

27
Q

Phishing

A

The use of spoofed communications (typically e-mail messages) to gain credit card numbers and other personal data to be used for fraudulent purposes. (p375)

28
Q

possessed knowledge access system

A

An access control system that uses information only the individual should know to identify that individual. (p352)

29
Q

Possessed object access systems

A

An access control system that uses a physical object an individual has in his or her possession to identify that individual. (p353)

30
Q

Private key encryption

A

A type of encryption that uses a single key to encrypt and decrypt the file or message. (p359)

31
Q

Public key encryption

A

A type of encryption that uses key pairs to encrypt and decrypt the file or message. (p359)

32
Q

Secure Web pages

A

A Web page that uses encryption to protect information transmitted via that Web page. (p358)

33
Q

security software

A

Software, typically a suite of programs, used to protect your computer against a variety of threats. (p369)

34
Q

social media hacks

A

The act of accessing someone else’s social media account to make changes to the content or to perform an activity as that individual. (p375)

35
Q

spear phishing

A

A personalized phishing scheme targeted at an individual. (p374)

36
Q

Trojan horse

A

A malicious program that masquerades as something else. (p366)

37
Q

two-factor authentication

A

Using two different methods to authenticate a user. (p353)

38
Q

Unauthorized access

A

Gaining access to a computer, mobile device, network, file, or other resource without permission. (p348)

39
Q

Unauthorized use

A

Using a computing resource for unapproved activities. (p348)

40
Q

virtual private network (VPN)

A

A private, secure path over the Internet that provides authorized users a secure means of accessing a private network via the Internet. (p360)

41
Q

war driving

A

Driving around an area with a Wi-Fi-enabled computer or mobile device to find a Wi-Fi network to access and use without authorization. (p350)

42
Q

Wi-Fi piggybacking

A

Accessing an unsecured Wi-Fi network from your current location without authorization. (p350)