1-7 Flashcards
after data leaves the netowrk the packets are vuilnerable to
interception
the view point of : If our computer has not been attacked so far , we must be secure “ often leads to the ___________ approach to computer security
reactive
most attacks can be categorized into one of 3 broad classes
intrusion, blocking, malware
any attempt to gain unauthorized access to a system
intrusion
attacks used to prevent legitimate access to a system
blocking
a generic term for software that has a malicious purpose
malware
_____________ is the most common threat to any system
malware
most obvious example of malware is a
computer virus
the ___________ sends itself to everyone within your notebook
MyDoom
trojans and viruses are the 2 most common forms of malware, but whats the third
spyware
hardware key loggers require the user to
physically go to the equipment to plant the device
a software key logger can be installed via a
trojan
intrusion attacks designed to gain access to a specific system is called hacking. whats another name for hacking
cracking
CERT stands for
Computer Emergency Response Team
An explicit attempt by attackers to prevent legitimate users of a service from using that service
Denial of service