Chapter 09: Network and Internet Security Flashcards
antivirus software
Software used to detect and eliminate computer viruses and other types of malware. (p369)
Biometric access systems
An access control system that uses one unique physical characteristic of an individual (such as a fingerprint, a face, veins, or a voice) to authenticate that individual. (p354)
bot
A computer that is controlled by a hacker or other computer criminal. (p364)
botnet
A group of bots that are controlled by one individual. (p364)
BYOD
Bring Your Own Device (p363)
code of conduct
Guidelines of acceptable computer use for a school, business, or organization (p348)
computer crimes
Any illegal act involving a computer. (p347)
Computer sabotage
An act of malicious destruction to a computer or computer resource. (p364)
computer virus
A software program installed without the user’s knowledge and designed to alter the way a computer operates or to cause harm to the computer system. (p365)
computer worm
A malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers. (p366)
cyberbullying
Children or teenagers bullying other children or teenagers via the Internet. (p381)
cyberstalking
Repeated threats or harassingbehavior between adults carried out via e-mail or another Internet communications method. (p381)
denial of service (DoS) attack
An act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function. (p367)
digital certificate
A group of electronic data that can be used to verify the identity of a person or organization; includes a key pair that can be used for encryption and digital signatures (also called a digital ID). (p379)
digital ID
A group of electronic data that can be used to verify the identity of a person or organization; includes a key pair that can be used for encryption and digital signatures (also called a digital certificate). (p379)
digital signature
A unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been changed since it was signed. (p380)
distributed denial of service (DDoS) attack
A denial of service (DoS) attack coming from many computers at once, often from a botnet. (p368)
dot cons
A fraud or scam carried out through the Internet. (p370)
Encryption
A method of scrambling the contents of an e-mail message or a file to make it unreadable if an unauthorized user intercepts it. (p358)
firewall
A collection of hardware and/or software intended to protect a computer or computer network from unauthorized access. (p356)
Hacking
Using a computer to break into another computer system. (p348)
Identity theft
Using someone else’s identity to purchase goods or services, obtain new credit cards or bank loans, or otherwise illegally masquerade as that individual. (p372)
Malware
Any type of malicious software. (p364)
Online auction fraud
When an item purchased through an online auction is never delivered after payment, or the item is not as specified by the seller. (p376)
Passwords
A secret combination of characters used to gain access to a computer, computer network, or other resource. (p352)
Pharming
The use of spoofed domain names to obtain personal information in order to use that information in fraudulent activities. (p375)
Phishing
The use of spoofed communications (typically e-mail messages) to gain credit card numbers and other personal data to be used for fraudulent purposes. (p375)
possessed knowledge access system
An access control system that uses information only the individual should know to identify that individual. (p352)
Possessed object access systems
An access control system that uses a physical object an individual has in his or her possession to identify that individual. (p353)
Private key encryption
A type of encryption that uses a single key to encrypt and decrypt the file or message. (p359)
Public key encryption
A type of encryption that uses key pairs to encrypt and decrypt the file or message. (p359)
Secure Web pages
A Web page that uses encryption to protect information transmitted via that Web page. (p358)
security software
Software, typically a suite of programs, used to protect your computer against a variety of threats. (p369)
social media hacks
The act of accessing someone else’s social media account to make changes to the content or to perform an activity as that individual. (p375)
spear phishing
A personalized phishing scheme targeted at an individual. (p374)
Trojan horse
A malicious program that masquerades as something else. (p366)
two-factor authentication
Using two different methods to authenticate a user. (p353)
Unauthorized access
Gaining access to a computer, mobile device, network, file, or other resource without permission. (p348)
Unauthorized use
Using a computing resource for unapproved activities. (p348)
virtual private network (VPN)
A private, secure path over the Internet that provides authorized users a secure means of accessing a private network via the Internet. (p360)
war driving
Driving around an area with a Wi-Fi-enabled computer or mobile device to find a Wi-Fi network to access and use without authorization. (p350)
Wi-Fi piggybacking
Accessing an unsecured Wi-Fi network from your current location without authorization. (p350)