9: Network and Internet Security Flashcards
any illegal act involving a computer
computer crime
gaining access to a computer, mobile device, network, file, or other resource without permission
unauthorized access
using a computing resource for unapproved activities
unauthorized use
using a computer to break into another computer system
hacking
driving around an area with a Wi-Fi-enabled computer or mobile device to find a Wi-Fi network to access and use without authorization
war driving
accessing an unsecured Wi-Fi network from your current location without authorization
Wi-Fi piggybacking
an access control system that uses information only the individual should know to identify that individual
possessed knowledge access system
a secret combination of characters used to gain access to a computer, computer network, or other resource
password
using two different methods to authenticate a user
two-factor authentication
an access control system that uses a physical object an individual has in his or her possession to identify that individual
possessed object access system
an access control system that uses one unique physical characteristic of an individual (such as a fingerprint, a face, veins, or a voice) to authenticate that individual
biometric access system
a collection of hardware and/or software intended to protect a computer or computer network from unauthorized access
firewall
a method of scrambling the contents of an e-mail message or a file to make it unreadable if an unauthorized user intercepts it
encryption
a Web page that uses encryption to protect information transmitted via that Web page
secure Web page
a type of encryption that uses a single key to encrypt and decrypt the file or message
private key encryption
a type of encryption that uses key pairs to encrypt and decrypt the file or message
public key encryption
a private, secure path over the Internet that provides authorized users a secure means of accessing a private network via the Internet
virtual private network (VPN)
an act of malicious destruction to a computer or computer resource
computer storage
a computer that is controlled by a hacker or other computer criminal
bot
a group of bots that are controlled by one individual
botnet
any type of malicious software
malware
a software program installed without the user’s knowledge and designed to alter the way a computer operates or to cause harm to the computer system
computer virus
a malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers
computer worm
a malicious program that masquerades as something else
Trojan horse
an act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function
denial of service (DoS) attack
software, typically a suite of programs, used to protect your computer against a variety of threats
security software
software used to detect and eliminate computer viruses and other types of malware
antivirus software
a fraud or scam carried out through the Internet
dot con
using someone else’s identity to purchase goods or services, obtain new credit cards or bank loans, or otherwise illegally masquerade as that individual
identity theft
the use of spoofed communications (typically e-mail messages) to gain credit card numbers and other personal data to be used for fraudulent purposes
phishing
a personalized phishing scheme targeted at an individual
spear phishing
the act of accessing someone else’s social media account to make changes to the content or to perform an activity as that individual
social media hack
the use of spoofed domain names to obtain personal information in order to use that information in fraudulent activities
pharming
when an item purchased through an online auction is never delivered after payment, or the item is not as specified by the seller
online auction fraud
AKA digital ID - a group of electronic data that can be used to verify the identity of a person or organization; includes a key pair that can be used for encryption and digital signatures
digital certificate
a unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been changed since it was signed
digital signature
children or teenagers bullying other children or teenagers via the Internet
cyberbullying
repeated threats or harassing behavior between adults carried out via e-mail or another Internet communications method
cyberstalking
software used by hackers to gather information from a debit/credit card during financial transactions
packetsniffing
numeric passwords, such as personal identification numbers (PINs)
passcodes
malware program that activates when it detects a certain condition, such as a particular keystroke being pressed
logic bomb
a logic bomb that is triggered by a particular time or date
time bomb