CH. 6 Terms Flashcards

1
Q

Adware – Software that collects consumer surfing and purchasing data (I)

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Botnet – A network of hijacked computers (O)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. Bot herder – Hackers that control hijacked computers (R)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. Click fraud – Inflating advertising revenue by clicking online ads numerous times (U)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. DoS – Overloading an Internet service provider’s email server by sending hundreds of email messages per second from randomly generated false address (T)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Email threats – Sending an email instructing the recipient to do something or else suffer adverse consequences (C)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. Hijacking – Gaining control of a computer to carry out unauthorized illicit activities (L)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. Internet misinformation – Circulating lies or misleading information using the world’s largest
    network (S)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. Internet terrorism – Using the internet to disrupt communications and e-commerce (M)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. Key logger – Use of spyware to record a user’s keystrokes (Q)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. Pharming – Diverting traffic from a legitimate website to a hacker’s website to gain access to personal and confidential information (N)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. Phishing – Emails that look like they came from a legitimate source but are actually from a hacker who is trying to get the user to divulge personal information (J)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. Spamming – Emailing an unsolicited message to many people at the same time (E)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. Splog – A spam blog that promotes affiliated websites to increase their Google PageRank (H)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. Spyware – Software that monitors and reports a user’s computing habits (A)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. Spoofing – Making an email look like it came from someone else (K)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. Typosquatting – Creating websites with names similar to real websites so users making errors while entering a website name are sent to a hacker’s site (F)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. Bluebugging – Making phone calls and sending text messages using another user’s phone without physically holding that phone (I)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. Bluesnarfing – Capturing data from devices that use Bluetooth technology (K)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Eavesdropping – Intercepting and/or listening in on private voice and data transmissions (F)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. Evil twin – A rogue wireless access point masquerading as a legitimate access point (M)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
  1. Packing sniffing – deep packet filtering (G)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. Phreaking – Using telephone lines to transmit viruses and to access, steal, and destroy data (J)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  1. Piggybacking – Gaining access to a protected system by latching onto a legitimate user (D)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  1. Vishing – Emails instructing a user to call a phone number where they are asked to divulge personal information (B)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  1. War dialing – Searching for modems on unprotected phone lines in order to access the attached computer and gain access to the network to which it is attached (H)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  1. War driving – Searching for unprotected wireless networks in a vehicle (C)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  1. Chipping – Inserting a chip that captures financial data in a legitimate credit card reader (E)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  1. Data diddling – Altering data before or during entry into a computer system (I)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  1. Data leakage – Copying company data, such as computer files without permission (F)
A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  1. Identity theft – Illegally obtaining confidential information, such as a SSN, about another person so that ii can be used for financial gain (A)
A

.

32
Q
  1. Round-down fraud – Placing truncated decimal places in an account controlled by the perpetrator (J)
A

.

33
Q
  1. Salami technique – Embezzling small fractions of funds over time (D)
A

.

34
Q
  1. Scavenging – Searching through garbage for confidential data (B)
A

.

35
Q
  1. Dictionary attack – Using software to guess company email addresses, send employees blank emails, and add unreturned messages to spammer email lists (J)
A

.

36
Q
  1. Hacking – Gaining access to a computer system without permission (W)
A

.

37
Q
  1. Logic bomb – Software that sits idle until a specified circumstance or time triggers it (S)
A

.

38
Q
  1. Malware – Software used to do harm (L)
A

.

39
Q
  1. Masquerading – Pretending to be a legitimate user, thereby gaining access to a system and all the rights and privileges of the legitimate user (N)
A

.

40
Q
  1. Password cracking – Capturing and decrypting passwords to gain access to a system (C)
A

.

41
Q
  1. Piggybacking – Using a wireless network without permission (E)
A

.

42
Q
  1. Posing – Creating a seemingly legitimate business, collecting personal information while making a sale, and never delivering the item sold (X)
A

.

43
Q
  1. Pretexting – Acting under false pretenses to gain confidential information (U)
A

.

44
Q
  1. Rootkit – Software that conceals processes, files, network connections, and system data from the operating system and other programs (Q)
A

.

45
Q
  1. Shoulder surfing – Observing or listing to users as they divulge personal information (V)
A

.

46
Q
  1. Skimming – Covertly swiping a credit card in a card reader that records the data for future use (F)
A

.

47
Q
  1. Social Engineering – Methods used to trick someone into divulging personal information (R)
A

.

48
Q
  1. Software piracy – Unauthorized copying or distribution of copyrighted software (P)
A

.

49
Q
  1. Steganography – Concealing data within a large MP3 file (G)
A

.

50
Q
  1. Superzapping – Special software used to bypass system controls (A)
A

.

51
Q
  1. Trap door - Entering a system using a back door that bypasses normal system controls (I)
A

.

52
Q
  1. Trojan horse – Unauthorized code in an authorized and properly functioning program (K)
A

.

53
Q
  1. Virus – Segment of executable code that attaches itself to software (B)
A

.

54
Q
  1. Worm – A program that can replicate itself and travel over networks (M)
A

.

55
Q
  1. Zero-day attack – Attack occurring between the discovery of a software vulnerability and the release of a patch to fix the problem (H)
A

.

56
Q
  1. Address Resolution Protocol (ARP) spoofing – Fake computer networking protocol messages sent to an Ethernet LAN to determine a network host’s hardware address when only its IP address is known (M)
A

.

57
Q
  1. Buffer overflow attack – So much input data that storage is exceeded; excess input contains code that takes control of the computer (J)
A

.

58
Q
  1. Carding – Verifying credit card validity (X)
A

.

59
Q
  1. Caller ID spoofing – Displaying an incorrect phone number to hide the caller’s identity (R)
A

.

60
Q
  1. Cyber-extortion – A demand for payment to ensure a hacker does not harm a computer (U)
A

.

61
Q
  1. Cyber-bullying – Using social networking to harass another person (Q)
A

.

62
Q
  1. Economic espionage – Theft of trade secrets and intellectual property (V)
A

.

63
Q
  1. Email spoofing – Making an electronic communication appear as though it originated from a different source (K)
A

.

64
Q
  1. IP address spoofing – Creating packets with a forged address to impersonate another computing system (L)
A

.

65
Q
  1. Internet auction fraud – Using a site that sells to the highest bidder to defraud another person (W)
A

.

66
Q
  1. Internet pump-and-dump fraud – Using the internet to inflate a stock price so it can be sold for
    profit (G)
A

.

67
Q
  1. Lebanese looping – Inserting a sleeve to trap a card in an ATM, pretending to help the owner to obtain his PIN, and using the card and PIN to drain the account (A)
A

.

68
Q
  1. Man-in-the-middle (MITM) attack – A hacker placing himself between a client and a host to intercept network traffic (T)
A

.

69
Q
  1. Podslurping – Using a small storage device to download unauthorized data from a computer (C)
A

.

70
Q

15.Ransomware – Software that encrypts programs and data until a payment is made to remove it (S)

A

.

71
Q
  1. Scareware – Malicious software that people are frightened into buying (E)
A

.

72
Q
  1. Sexting – Exchanging explicit messages and pictures by telephone (H)
A

.

73
Q
  1. SQL injection – Inserting a malicious database query in input in a way that it can be executed by an application program (I)
A

.

74
Q
  1. SMS spoofing – Changing the name or number a text message appears to come from (N)
A

.

75
Q
  1. XSS attack – A link containing malicious code that takes a victim to a vulnerable website where the victim’s browser executes the malicious code embedded in the link (P)
A

.

76
Q
  1. Tabnapping – Secretly changing an already open browser tab (Y)
A

.