Chapter 4 Flashcards
(23 cards)
War driving Wi-fi piggybacking
unauthorized use of WiFi
Processed knowledge access system
an identification system that requires the individual requesting to provide info
Two-factor authentication
Using two different methods to authenticate a user
Possessed object access systems
use physical objects for identification purposes
firewall
security system that creates a barrier between a computer/network to protect against unauthorized access
Encryption
Temporarily converting data into a form which is unreadable
Secure Web paged
secures data being sent over internet
Private Key Encryption
Uses one symmetrical key to decrypt and encrypt a file or message
Public Key Encryption
uses 2 keys to encrypt and encrypt
Virtual private network
used when a continuous secure channel over Internet is needed
Computer Sabotage
acts of malicious destruction to a computer or computer resource
Botnet
a group of bots controlled by one individual and can work together in a coordinated fashion
Bot
A computer that is controlled by a hacker
Malware
a type of malicious software
Computer Virus
software that is installed that alters the way a computer operates
Computer worms
like a virus but does not infect other computer files to replicate itself
Trojan Horse
malware that masquerades as something else
Denial of service attack
attempts to flood a network server or web server with too many requests that denies users service
dot cons
an area of computer crime involves fraud, theft, scams and related activities designed to steal money
Phishing
a message to trick recipient to revealing sensitive information
Pharming
using domain names used to obtain personal info
Digital certificate
authenticates the identity of an individual or organization
hacking
using one computer to break into another