Cat Definitions part 2 Flashcards

1
Q

CLOUD COMPUTING

A

THE DELIVERY OF DIFFERENT SERVICES THROUGH THE INTERNET.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BOTNET

A

A NETWORK OF PRIVATE COMPUTERS
INFECTED WITH MALICIOUS SOFTWARE AND
CONTROLLED AS A GROUP WITHOUT THE
OWNERS KNOWLEDGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FLAMING

A

POSTING OFFENSIVE CONTENT ONLINE
MOSTLY IN FORUMS SUCH AS CHAT ROOM OR
SOCIAL NETWORKING WITH THE INTENET TO
CAUSE ARGUMENTS DEBATES OR TO OFFEND OTHERS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HOTSPOT

A

A PHYSICAL LOCATION WHERE PEOPLE CAN ACCESS THE INTERNET, TYPICALLY USING WIFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CAPPED

A

LIMITED AMOUNT OF DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

UNCAPPED

A

UNLIMITED AMOUNT OF DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CRUFT

A

POORLY DESIGNED UNNECESSARILY
COMPLICATED OR UNWANTED CODE OR SOFTWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

BARNACLE

A

MALICIOUS SOFTWARE THAT IS DESIGNED TO
TAKE PARTIAL OR FULL CONTROL OF A
COMPUTERS OPERATIONS WITHOUT THE
USERS KNOWLEDGE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SPYWARE

A

MALICIOUS SOFTWARE DESIGNED TO ENTER
YOUR COMPUTER DEVICE AND GATHER DATA
WITH THE INTENTION TO SEND IT TO A THIRD
PARTY WITHOUT OUR CONSENT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

MALWARE

A

COLLECTIVE NAME FOR MALICIOUS SOFTWARE
INCLUDING VIRUSES RANDSOMEWARE AND SPYWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

KEYLOGGERS

A

MONITORS WHAT IS BEING TYPED ON THE
COMPUTER AS WELL AS A MOBILE KEYBOARD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PIRACY

A

UNAUTHORIZED USE, COPYING OR
DISTRIBUTION OF COPYRIGHTED SOFTWARE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

PHABLET

A

A SMARTPHONE WITH A SCREEN LARGER THAN
5”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HONEYPOT

A

A NETWORK ATTACHED SECURITY SYSTEM SET
UP AS A DECOY TO LURE CYBERATTACKERS
AND TO DETECT DEFLECT OR STUDY HACKING
ATTEMPTS IN ORDER TO GAIN UNAUTHORISED ACCESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SPOOFING

A

THE FORGERY OF AN EMAIL HEADER SO THAT
THE MESSAGE APPEARS TO HAVE ORIGNATED
FROM SOMEONE OTHER THAN THE ORIGINAL SOURCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

OFFICE 365

A

WEB-BASED OFFICE SUITE FROM MICROSOFT
AND GOOGLE. YOU CAN CREATE, EDIT AND STORE FILES ON THE WEB

17
Q

MINIMUM REQUIREMENTS

A

ARE THE ESSENTIAL HARDWARE SPECIFICATIONS NEEDED TO RUN THE PROGRAM AT ITS MOST BASIC LEVEL.

18
Q

RECOMMENDED REQUIREMENTS

A

HARDWARE SPECIFICATIONS RECOMMENDED FOR AN OPTIMAL PROGRAM EXPERIENCE

19
Q

EAVESDROPPING

A

AN EAVESDROPPING ATTACK, ALSO KNOWN AS
A SNIFFING OR SNOOPING ATTACK, IS A THEFT
OF INFORMATION AS IT IS TRANSMITTED OVER
A NETWORK BY A COMPUTER, SMARTPHONE,
OR ANOTHER CONNECTED DEVICE. THE
ATTACK TAKES ADVANTAGE OF UNSECURED
NETWORK COMMUNICATIONS TO ACCESS DATA
AS IT IS BEING SENT OR RECEIVED BY ITS USER

20
Q

CYBERSQUATTER

A

THE UNAUTHORIZED REGISTRATION AND USE OF INTERNET DOMAIN NAMES

21
Q

BOUNCE RATE

A

BOUNCE RATE IS THE PERCENTAGE OF SITE VISITS THAT ARE SINGLE-PAGE SESSIONS

22
Q

SOCKPUPPET

A

WE DEFINE A SOCKPUPPET AS A FICTITIOUS ONLINE IDENTITY CREATED FOR THE PURPOSES OF DECEPTION.

23
Q

ZOMBIE

A

N COMPUTING, A ZOMBIE IS
A COMPUTER CONNECTED TO A NETWORK THAT HAS BEEN COMPROMISED BY A HACKER, A VIRUS OR A TROJAN.

24
Q

DARK WEB

A

THE DARK WEB IS THE HIDDEN COLLECTIVE OF INTERNET SITES ONLY ACCESSIBLE BY A SPECIALIZED WEB BROWSER.

25
NETWORK TOPOLOGY
NETWORK TOPOLOGY REFERS TO THE MANNER IN WHICH THE LINKS AND NODES OF A NETWORK ARE ARRANGED TO RELATE TO EACH OTHER
26
EMBEDDED SYSTEM
AN EMBEDDED SYSTEM IS A DEDICATED COMPUTING DEVICE OR SYSTEM DESIGNED TO PERFORM SPECIFIC FUNCTIONS WITHIN A LARGER SYSTEM.
27
ACCESS CONTROL
AN OPERATING SYSTEM ASKS FOR PERMISSION BEFORE SOFTWARE CAN BE INSTALLED
28
VIRTUAL MEMORY
TYPE OF MEMORY THAT ALLOWS THE OPERATING SYSTEM TO WORK AS IF IT HAS ACCESS TO MORE RAM THAN THE AMOUNT THAT IS PHYSICALLY PRESENT IN THE COMPUTER.
29
M.2 (M DOT 2)
M.2 is a compact SSD interface for high-speed data storage.
30
ARDUINO BOARD
microcontroller platform for creating interactive electronic projects easily.
31
Entry-level computer
A BUDGET-FRIENDLY DEVICE DESIGNED FOR BASIC TASKS LIKE WEB BROWSING, EMAIL, WORD PROCESSING, AND LIGHT MEDIA CONSUMPTION.
32
BIG DATA
BIG DATA REFERS TO LARGE AND COMPLEX SETS OF DATA THAT ARE DIFFICULT TO PROCESS USING TRADITIONAL METHODS. IT INCLUDES VAST AMOUNTS OF STRUCTURED, SEMI-STRUCTURED, AND UNSTRUCTURED DATA COLLECTED FROM VARIOUS SOURCES, SUCH AS SOCIAL MEDIA, SENSORS, AND ONLINE TRANSACTIONS. THE TERM "BIG DATA" EMPHASIZES THE CHALLENGES OF STORING, MANAGING, AND ANALYSING SUCH LARGE VOLUMES OF DATA TO EXTRACT VALUABLE INSIGHTS AND MAKE INFORMED DECISIONS.
33
Convergence
The trend where separate technologies and functions that previously required different devices are combined into a single device