Test 3 Flashcards
(30 cards)
pretexting
deceiving by pretending to be someone else.
phishing
obtaining unauthorized access to data via email.
spoofing
someone pretending to be someone else.
sniffing
intercepting computer communications
usurping
invading a computer system and replacing legitimate programs with their own unauthorized programs that disrupt services.
malware (5)
Viruses, Worms, Trojan Horse, Spyware and Adware
virus
-computer program that replicates itself
-ultimately consuming the computer’s resources
worms
are viruses that propagate themselves using the Internet or other computer networks
spyware/adware
-invade your computer and capture keystroke information
-Spyware does so for malicious reasons
-Adware just does so to report activity to allow for targeted ads.
beacons
-tiny files that gather demographic information about you
-Lotame Solutions specializes in Beacons.
bot
new term for the family of Viruses, Worms, Trojan Horse, Spyware and Adware
bot herder
-refers to the individual or organization that controls the Bots.
internet
a worldwide collection of networks that links millions
counter-measures used by your computer software to reduce vulnerabilities to cyber attacks (5)
-Firewalls
-Encryption
-Additional Passwords
-Antispyware/anti-adware software
-Backups/ RAID, off site backup storage
internet origination
ARPANET in September 1969
2 main goals of internet
-Allow scientists at different physical locations to share information and work together
-Function even if part of the network were disabled or destroyed by a disaster
database applications (4)
– Forms
– Reports
– Queries
– Application programs
DBMS
- a program used to create, process, and administer a database.
- a licensed product.
- different from a database (a database is a collection of tables, relationships and the metadata (description of the data elements))
examples of DBMS (5)
DBM developer/license
* DB2 IBM
* Access Microsoft
* SQL Server Microsoft
* Oracle Database Oracle
* MySQL Open source
functions of a DBMS (7)
- Create tables, relationships and other structures (see metadata contents)
- Process the database (read, insert, modify or delete data)
- Uses SQL to perform these operations
- Administration of database
- Security
- Permission
- Backup/ Recovery
forms
used for data entry
reports
are produced from contents
queries
used to access
functions performed by the application programs (7)
- Process the database
- Forms
- Reports
- Queries
- Allow access over the internet
- Facilitate multi-user access to the database
- Use locking to prevent lost-update problem