Ch 10 Flashcards
a serious form of personal cybercrime with the perpetrator demonstrating a pattern of harassment and posing a credible threat of harm is
cyberstalking
what redirects you to a phony website even if you type the correct address into your browser
pharming
what occurs when someone fraudulently uses your name, SSN, or bank or credit card number
identity theft
what is an unlawful attack against computers or networks thats done to intimidate a government or its people for a political or social agenda
cyberterriorism
what occurs when sensitive data is stolen or viewed by someone who is not authorized to do so
a data breach
a ____ is a form of malware that changes your home page and redirects you to other websites
browser hijacker
a ____ sends out so much traffic that it could cripple a server or network
denial of service attack
the ____ is encrypted and hidden and only accessible using the TOR browser to view it anonymously and securely
deep web
what is a security feature of a router that shields the devices on a private network from the public network (the Internet)
network address translation
what makes it a crime to access classified info
comp fraud and abuse act of 1986
where can you file a cyber crime report
internet crime complaint center
what forces users to practice safe computing and prevent a lot of potential problems from affecting the system
acceptable user policy AUP
what is an attack that occurs on the day an exploit is discovered before the publisher of the compromised software can fix it
zero day exploit
what is a large planned update that addresses multiple problems or adds multiple features
service pack
what addresses individual problem as they are discovered
patch/hotfix
what converts unencrypted, plain text, into code called cipertext
encryption
what will notify you before changes are made to your comp
user account control UAC
what uses a push button, PIN< or USB key to auto configure devices to connect to your network
wifi protected setup WPS
what adds security to a wireless network by encrypting transmitted data
wireless encryption
what is the wireless network name
SSID
what is a device that connects 2 or more networks together
router
what acts like a firewall by preventing unauthorized access to your network
router
what are packages of security software that include a combination of features such as antivirus, firewall, and privacy protection
security suites
what is an advantage of security suites
complete protection
what is an disadvantage of security suites
expenisve and may use a lot of system resources
what prevents adware and spy ware software from installing itself on your comp and can be used to clean an infected macine
antispyware software
what provides protection against more than just viruses but also protects against Trojans, worms, and spyware
antivirus programs
software firewall also blocks access to
an individual machine
what is a hardware device that blocks unauthorized access to your network
firewall