9: Network and Internet Security Flashcards

(42 cards)

1
Q

any illegal act involving a computer

A

computer crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

gaining access to a computer, mobile device, network, file, or other resource without permission

A

unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

using a computing resource for unapproved activities

A

unauthorized use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

using a computer to break into another computer system

A

hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

driving around an area with a Wi-Fi-enabled computer or mobile device to find a Wi-Fi network to access and use without authorization

A

war driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

accessing an unsecured Wi-Fi network from your current location without authorization

A

Wi-Fi piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

an access control system that uses information only the individual should know to identify that individual

A

possessed knowledge access system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a secret combination of characters used to gain access to a computer, computer network, or other resource

A

password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

using two different methods to authenticate a user

A

two-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

an access control system that uses a physical object an individual has in his or her possession to identify that individual

A

possessed object access system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

an access control system that uses one unique physical characteristic of an individual (such as a fingerprint, a face, veins, or a voice) to authenticate that individual

A

biometric access system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

a collection of hardware and/or software intended to protect a computer or computer network from unauthorized access

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a method of scrambling the contents of an e-mail message or a file to make it unreadable if an unauthorized user intercepts it

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a Web page that uses encryption to protect information transmitted via that Web page

A

secure Web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a type of encryption that uses a single key to encrypt and decrypt the file or message

A

private key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a type of encryption that uses key pairs to encrypt and decrypt the file or message

A

public key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

a private, secure path over the Internet that provides authorized users a secure means of accessing a private network via the Internet

A

virtual private network (VPN)

18
Q

an act of malicious destruction to a computer or computer resource

A

computer storage

19
Q

a computer that is controlled by a hacker or other computer criminal

20
Q

a group of bots that are controlled by one individual

21
Q

any type of malicious software

22
Q

a software program installed without the user’s knowledge and designed to alter the way a computer operates or to cause harm to the computer system

A

computer virus

23
Q

a malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers

A

computer worm

24
Q

a malicious program that masquerades as something else

25
an act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function
denial of service (DoS) attack
26
software, typically a suite of programs, used to protect your computer against a variety of threats
security software
27
software used to detect and eliminate computer viruses and other types of malware
antivirus software
28
a fraud or scam carried out through the Internet
dot con
29
using someone else’s identity to purchase goods or services, obtain new credit cards or bank loans, or otherwise illegally masquerade as that individual
identity theft
30
the use of spoofed communications (typically e-mail messages) to gain credit card numbers and other personal data to be used for fraudulent purposes
phishing
31
a personalized phishing scheme targeted at an individual
spear phishing
32
the act of accessing someone else’s social media account to make changes to the content or to perform an activity as that individual
social media hack
33
the use of spoofed domain names to obtain personal information in order to use that information in fraudulent activities
pharming
34
when an item purchased through an online auction is never delivered after payment, or the item is not as specified by the seller
online auction fraud
35
AKA digital ID - a group of electronic data that can be used to verify the identity of a person or organization; includes a key pair that can be used for encryption and digital signatures
digital certificate
36
a unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been changed since it was signed
digital signature
37
children or teenagers bullying other children or teenagers via the Internet
cyberbullying
38
repeated threats or harassing behavior between adults carried out via e-mail or another Internet communications method
cyberstalking
39
software used by hackers to gather information from a debit/credit card during financial transactions
packetsniffing
40
numeric passwords, such as personal identification numbers (PINs)
passcodes
41
malware program that activates when it detects a certain condition, such as a particular keystroke being pressed
logic bomb
42
a logic bomb that is triggered by a particular time or date
time bomb