Cat Definitions part 2 Flashcards
CLOUD COMPUTING
THE DELIVERY OF DIFFERENT SERVICES THROUGH THE INTERNET.
BOTNET
A NETWORK OF PRIVATE COMPUTERS
INFECTED WITH MALICIOUS SOFTWARE AND
CONTROLLED AS A GROUP WITHOUT THE
OWNERS KNOWLEDGE
FLAMING
POSTING OFFENSIVE CONTENT ONLINE
MOSTLY IN FORUMS SUCH AS CHAT ROOM OR
SOCIAL NETWORKING WITH THE INTENET TO
CAUSE ARGUMENTS DEBATES OR TO OFFEND OTHERS
HOTSPOT
A PHYSICAL LOCATION WHERE PEOPLE CAN ACCESS THE INTERNET, TYPICALLY USING WIFI
CAPPED
LIMITED AMOUNT OF DATA
UNCAPPED
UNLIMITED AMOUNT OF DATA
CRUFT
POORLY DESIGNED UNNECESSARILY
COMPLICATED OR UNWANTED CODE OR SOFTWARE
BARNACLE
MALICIOUS SOFTWARE THAT IS DESIGNED TO
TAKE PARTIAL OR FULL CONTROL OF A
COMPUTERS OPERATIONS WITHOUT THE
USERS KNOWLEDGE
SPYWARE
MALICIOUS SOFTWARE DESIGNED TO ENTER
YOUR COMPUTER DEVICE AND GATHER DATA
WITH THE INTENTION TO SEND IT TO A THIRD
PARTY WITHOUT OUR CONSENT
MALWARE
COLLECTIVE NAME FOR MALICIOUS SOFTWARE
INCLUDING VIRUSES RANDSOMEWARE AND SPYWARE
KEYLOGGERS
MONITORS WHAT IS BEING TYPED ON THE
COMPUTER AS WELL AS A MOBILE KEYBOARD
PIRACY
UNAUTHORIZED USE, COPYING OR
DISTRIBUTION OF COPYRIGHTED SOFTWARE
PHABLET
A SMARTPHONE WITH A SCREEN LARGER THAN
5”
HONEYPOT
A NETWORK ATTACHED SECURITY SYSTEM SET
UP AS A DECOY TO LURE CYBERATTACKERS
AND TO DETECT DEFLECT OR STUDY HACKING
ATTEMPTS IN ORDER TO GAIN UNAUTHORISED ACCESS
SPOOFING
THE FORGERY OF AN EMAIL HEADER SO THAT
THE MESSAGE APPEARS TO HAVE ORIGNATED
FROM SOMEONE OTHER THAN THE ORIGINAL SOURCE
OFFICE 365
WEB-BASED OFFICE SUITE FROM MICROSOFT
AND GOOGLE. YOU CAN CREATE, EDIT AND STORE FILES ON THE WEB
MINIMUM REQUIREMENTS
ARE THE ESSENTIAL HARDWARE SPECIFICATIONS NEEDED TO RUN THE PROGRAM AT ITS MOST BASIC LEVEL.
RECOMMENDED REQUIREMENTS
HARDWARE SPECIFICATIONS RECOMMENDED FOR AN OPTIMAL PROGRAM EXPERIENCE
EAVESDROPPING
AN EAVESDROPPING ATTACK, ALSO KNOWN AS
A SNIFFING OR SNOOPING ATTACK, IS A THEFT
OF INFORMATION AS IT IS TRANSMITTED OVER
A NETWORK BY A COMPUTER, SMARTPHONE,
OR ANOTHER CONNECTED DEVICE. THE
ATTACK TAKES ADVANTAGE OF UNSECURED
NETWORK COMMUNICATIONS TO ACCESS DATA
AS IT IS BEING SENT OR RECEIVED BY ITS USER
CYBERSQUATTER
THE UNAUTHORIZED REGISTRATION AND USE OF INTERNET DOMAIN NAMES
BOUNCE RATE
BOUNCE RATE IS THE PERCENTAGE OF SITE VISITS THAT ARE SINGLE-PAGE SESSIONS
SOCKPUPPET
WE DEFINE A SOCKPUPPET AS A FICTITIOUS ONLINE IDENTITY CREATED FOR THE PURPOSES OF DECEPTION.
ZOMBIE
N COMPUTING, A ZOMBIE IS
A COMPUTER CONNECTED TO A NETWORK THAT HAS BEEN COMPROMISED BY A HACKER, A VIRUS OR A TROJAN.
DARK WEB
THE DARK WEB IS THE HIDDEN COLLECTIVE OF INTERNET SITES ONLY ACCESSIBLE BY A SPECIALIZED WEB BROWSER.