Exam 2 Flashcards
(39 cards)
Internet
network of computers/similar devices throughout the world
World Wide Web
collection of pages (digital documents of content)
Man-in-the-browser
can utilize anything a user inputs into a browser
Keystroke Logger
hardware/software that records user keystrokes
Page-in-the-middle
the user is redirected to another page
Download Substitution
user installs malicious code instead of/in addition to their intended download
Website Defacement
when an attacker replaces/modifies content of a website
Fake Website
A copy of a real website (like a bank webpage) that looks realistic, so users enter information willingly
Integrity Checksum
Can detect altered content on a website
Signed code or data
a digital signature on code, vouching its authenticity
Web Bug
a tiny image loaded on a website, letting its owner know of its display on another user’s screen
Click Jacking
Disguising what a link actually leads to
Least Privilege
giving people access to as few resources as necessary
Multiprogrammed Operating Systems
a monitor overseeing each program’s execution
Multitasking Operating Systems
allows multiple users to perform multiple tasks at the same time
Hook (as in Hook into an operating system)
be incorporated into an operating system
Audit Logs
a record of who accessed what and how
Virtual Machine
operating system offering user only what they need to see, and nothing else
Trusted System
a system with evidence to support the claim it uses a function or policy
Root
highest privilege user
Routing
when a device figures out how best to forward along data
Induction
tapping a wire and reading the radiation signals
OSI model (know the definition, not all layers)
a virtual concept of computer network communications
MAC address
unique identifier of a network interface card that connects a computer and a network