9: Network and Internet Security Flashcards
(42 cards)
any illegal act involving a computer
computer crime
gaining access to a computer, mobile device, network, file, or other resource without permission
unauthorized access
using a computing resource for unapproved activities
unauthorized use
using a computer to break into another computer system
hacking
driving around an area with a Wi-Fi-enabled computer or mobile device to find a Wi-Fi network to access and use without authorization
war driving
accessing an unsecured Wi-Fi network from your current location without authorization
Wi-Fi piggybacking
an access control system that uses information only the individual should know to identify that individual
possessed knowledge access system
a secret combination of characters used to gain access to a computer, computer network, or other resource
password
using two different methods to authenticate a user
two-factor authentication
an access control system that uses a physical object an individual has in his or her possession to identify that individual
possessed object access system
an access control system that uses one unique physical characteristic of an individual (such as a fingerprint, a face, veins, or a voice) to authenticate that individual
biometric access system
a collection of hardware and/or software intended to protect a computer or computer network from unauthorized access
firewall
a method of scrambling the contents of an e-mail message or a file to make it unreadable if an unauthorized user intercepts it
encryption
a Web page that uses encryption to protect information transmitted via that Web page
secure Web page
a type of encryption that uses a single key to encrypt and decrypt the file or message
private key encryption
a type of encryption that uses key pairs to encrypt and decrypt the file or message
public key encryption
a private, secure path over the Internet that provides authorized users a secure means of accessing a private network via the Internet
virtual private network (VPN)
an act of malicious destruction to a computer or computer resource
computer storage
a computer that is controlled by a hacker or other computer criminal
bot
a group of bots that are controlled by one individual
botnet
any type of malicious software
malware
a software program installed without the user’s knowledge and designed to alter the way a computer operates or to cause harm to the computer system
computer virus
a malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers
computer worm
a malicious program that masquerades as something else
Trojan horse