CH. 6 Terms Flashcards
1
Q
Adware – Software that collects consumer surfing and purchasing data (I)
A
.
2
Q
- Botnet – A network of hijacked computers (O)
A
.
3
Q
- Bot herder – Hackers that control hijacked computers (R)
A
.
4
Q
- Click fraud – Inflating advertising revenue by clicking online ads numerous times (U)
A
.
5
Q
- DoS – Overloading an Internet service provider’s email server by sending hundreds of email messages per second from randomly generated false address (T)
A
.
6
Q
- Email threats – Sending an email instructing the recipient to do something or else suffer adverse consequences (C)
A
.
7
Q
- Hijacking – Gaining control of a computer to carry out unauthorized illicit activities (L)
A
.
8
Q
- Internet misinformation – Circulating lies or misleading information using the world’s largest
network (S)
A
.
9
Q
- Internet terrorism – Using the internet to disrupt communications and e-commerce (M)
A
.
10
Q
- Key logger – Use of spyware to record a user’s keystrokes (Q)
A
.
11
Q
- Pharming – Diverting traffic from a legitimate website to a hacker’s website to gain access to personal and confidential information (N)
A
.
12
Q
- Phishing – Emails that look like they came from a legitimate source but are actually from a hacker who is trying to get the user to divulge personal information (J)
A
.
13
Q
- Spamming – Emailing an unsolicited message to many people at the same time (E)
A
.
14
Q
- Splog – A spam blog that promotes affiliated websites to increase their Google PageRank (H)
A
.
15
Q
- Spyware – Software that monitors and reports a user’s computing habits (A)
A
.
16
Q
- Spoofing – Making an email look like it came from someone else (K)
A
.
17
Q
- Typosquatting – Creating websites with names similar to real websites so users making errors while entering a website name are sent to a hacker’s site (F)
A
.
18
Q
- Bluebugging – Making phone calls and sending text messages using another user’s phone without physically holding that phone (I)
A
.
19
Q
- Bluesnarfing – Capturing data from devices that use Bluetooth technology (K)
A
.
20
Q
- Eavesdropping – Intercepting and/or listening in on private voice and data transmissions (F)
A
.
21
Q
- Evil twin – A rogue wireless access point masquerading as a legitimate access point (M)
A
.
22
Q
- Packing sniffing – deep packet filtering (G)
A
.
23
Q
- Phreaking – Using telephone lines to transmit viruses and to access, steal, and destroy data (J)
A
.
24
Q
- Piggybacking – Gaining access to a protected system by latching onto a legitimate user (D)
A
.
25
Q
- Vishing – Emails instructing a user to call a phone number where they are asked to divulge personal information (B)
A
.
26
Q
- War dialing – Searching for modems on unprotected phone lines in order to access the attached computer and gain access to the network to which it is attached (H)
A
.
27
Q
- War driving – Searching for unprotected wireless networks in a vehicle (C)
A
.
28
Q
- Chipping – Inserting a chip that captures financial data in a legitimate credit card reader (E)
A
.
29
Q
- Data diddling – Altering data before or during entry into a computer system (I)
A
.
30
Q
- Data leakage – Copying company data, such as computer files without permission (F)
A
.