Vocab 9 - 15 & Web 2.0 (Includes reversed cards as well) Flashcards
(526 cards)
Computer communications
A process in which two or more computers or devices transfer data, instructions, and information.
- Sending device → Communications channel → Receiving device
computer security risk
Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
cybercrime
A Network or Internet-based illegal act
Computer Security Risks
- Internet and network attacks
- unauthorized access and use
- hardware theft (stealing a thumb drive or hard drive)
- system failure (lightning strike)
- infromation theft (stollen identity)
- software theft (illegal copy)
Data transmitted over networks
Has a higher degree of security risk than data kept on an organization’s premises
online security service
A Web site that evaluates your computer to check for Internet and e-mail vulnerabilities.
Virus
Affects a computer negatively by altering the way the computer works <!--EndFragment-->
Worm
Replicates (copies itself), consuming resources and possibly shutting down the computer or network <!--EndFragment-->
Trojan Horse
A malicious program that hides within or looks like a legitimate program <!--EndFragment-->
Rootkit
Program that hides, creating a “back door” for a remote location to take full control of the computer.
Symptoms of an infected computer include:
- Runs much slower than usual
- Available memory is less than expected
- Files become corrupted
- Screen displays unusual message or image
- Music or unusual sounds play randomly
- Existing programs and files disappear
- Programs or files do not work properly
- Unknown programs or files mysteriously appear
- System properties change
- Operating system does not boot (start up)
- Operating system shuts down unexpectedly
Steps/precautions users can take to protect their home and work computers and mobile devices from malicious infections:
- Never start a computer with removable media inserted in the drives or plugged in the ports, unless the media are uninfected.
- Never open an email attachment unless you are expecting it and it is from a trusted source.
- Set the macro security in programs so that you can enable or disable macros. Enable macros only if the document is from a trusted source and you are expecting it.
- Install an antivirus program on all of your computers. Update the software and the virus signature files regularly.
- Scan all downloaded programs for viruses and other maleware.
- If the antivirus program flags an email attachment as infected, delete or quarantine the attachment immediately.
- Before using any removable media, scan the media for malware. Follow this procedure even for shrink-wrapped software from major developers. Some commercial software has been infected and distributed to unsuspectiing users.
- Install a personal firewall program.
- Stay informed about new virus alerts and virus hoaxes.
botnet
A group of compromised computers connected to a network
A compromised computer is known as a zombie
DoS attack
A denial of service attack: disrupts computer access to Internet services
Distributed DoS (DDoS)
back door
A program or set of instructions in a program that allows remote attackers to bypass security controls
Spoofing
A technique intruders use to make their network or Internet transmission appear legitimate.
firewall
Hardware and/or software that protects computers and networks from intrusion
Intrusion detection software
- Analyzes all network traffic
- Assesses system vulnerabilities
- Identifies any unauthorized intrusions
- Notifies network administrators of suspicious behavior patterns or system breaches
Honeypot
Vulnerable computer that is set up to entice an intruder to break into it
Unauthorized access
The use of a computer or network without permission <!--EndFragment-->
Unauthorized use
The use of a computer or its data for unapproved or possibly illegal activities.<!--EndFragment-->
The measures organizations take to help prevent unauthorized access and use:
- Acceptable use policy
- Disable file and printer sharing
- Firewalls
- Intrusion detection software
Access controls
Define who can access a computer, when they can access it, and what actions they can take:
- Two-phase processes called identification and authentication
- User name
- Password
- Passphrase
- CAPTCHA
possessed object
- Any item that you must carry to gain access to a computer or computer facility.
- Often are used in combination with a personal identification number (PIN)