Test 3 Flashcards

(30 cards)

1
Q

pretexting

A

deceiving by pretending to be someone else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

phishing

A

obtaining unauthorized access to data via email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

spoofing

A

someone pretending to be someone else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

sniffing

A

intercepting computer communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

usurping

A

invading a computer system and replacing legitimate programs with their own unauthorized programs that disrupt services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

malware (5)

A

Viruses, Worms, Trojan Horse, Spyware and Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

virus

A

-computer program that replicates itself
-ultimately consuming the computer’s resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

worms

A

are viruses that propagate themselves using the Internet or other computer networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

spyware/adware

A

-invade your computer and capture keystroke information
-Spyware does so for malicious reasons
-Adware just does so to report activity to allow for targeted ads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

beacons

A

-tiny files that gather demographic information about you
-Lotame Solutions specializes in Beacons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

bot

A

new term for the family of Viruses, Worms, Trojan Horse, Spyware and Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

bot herder

A

-refers to the individual or organization that controls the Bots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

internet

A

a worldwide collection of networks that links millions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

counter-measures used by your computer software to reduce vulnerabilities to cyber attacks (5)

A

-Firewalls
-Encryption
-Additional Passwords
-Antispyware/anti-adware software
-Backups/ RAID, off site backup storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

internet origination

A

ARPANET in September 1969

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

2 main goals of internet

A

-Allow scientists at different physical locations to share information and work together
-Function even if part of the network were disabled or destroyed by a disaster

17
Q

database applications (4)

A

– Forms
– Reports
– Queries
– Application programs

18
Q

DBMS

A
  • a program used to create, process, and administer a database.
  • a licensed product.
  • different from a database (a database is a collection of tables, relationships and the metadata (description of the data elements))
19
Q

examples of DBMS (5)

A

DBM developer/license
* DB2 IBM
* Access Microsoft
* SQL Server Microsoft
* Oracle Database Oracle
* MySQL Open source

20
Q

functions of a DBMS (7)

A
  • Create tables, relationships and other structures (see metadata contents)
  • Process the database (read, insert, modify or delete data)
  • Uses SQL to perform these operations
  • Administration of database
  • Security
  • Permission
  • Backup/ Recovery
21
Q

forms

A

used for data entry

22
Q

reports

A

are produced from contents

23
Q

queries

A

used to access

24
Q

functions performed by the application programs (7)

A
  • Process the database
  • Forms
  • Reports
  • Queries
  • Allow access over the internet
  • Facilitate multi-user access to the database
  • Use locking to prevent lost-update problem
25
enterprise DBMS
-process large organizational or workgroup databases. -Supports thousands of user and many different database applications 24/7.
26
enterprise DBMS examples
DB2, SQLServer, and Oracle
27
personal DBMS
-designed for smaller simpler database applications -Supports fewer than 100 and usually single users
28
personal DBMS example
access
29
entity (file name)
something the user wants to track
30
risk management
the process of identifying, assessing and controlling financial, legal, strategic and security risks to an organization's capital and earnings.