Chapter 5 Flashcards
software to detect and remove viruses and other malware
anti-virus
another term for public key encryption
asymmetric key encryption
establishing a user’s identity
authentication
method of by-passing security in a system, built in by the system designers
backdoor
process of registering a user for a biometric system by taking an initial sample
biometric enrolment
measurements taken from a biometric sample
biometric template
use of fingerprints, retina scans, or other body features as an authentication mechanism
biometrics
group of zombie computers under the control of a criminal
botnet
attempt to break a password by trying all possible combinations of letters, numbers, and symbols
brute force attack
system designed to create text that is unreadable to a computer but understandable to a person, to reduce spam
CAPTCHA
organization that issues digital certificates to individuals and companies
Certificate Authority
result of encrypting plaintext
ciphertext
UK law governing criminal offenses committed using a computer
Computer Misuse Act
another word for hacking
cracking
flooding a computer system with data so that it cannot respond to genuine users
Denial of Service Attack
attempt to break a password by trying all possible words
dictionary attack
technique used to authenticate remote users, such as online shopping businesses
digital signatures
denial of service attack committed using dozens of computers, usually zombies on a botnet
Distributed Denial of Service attack
technique used by criminals to alter domain name system (DNS) records and drive users from faking sites to committing phishing
DNS poisoning
program which automatically downloads when a user visits a webpage, usually without their knowledge or consent
drive-by download
system of encoding plaintext so that it cannot be understood with access to an encryption key
encryption
used to encrypt and decrypt data
encryption key
Extended Validation SSL; digital certificate validation technique used on the world wide web
EV SSL
when a system incorrectly rejects an action instead of accepting it
false negative
when a system incorrectly accepts an action instead of rejecting it
false positive
system that encrypts all data saved to a hard disk automatically and transparently
full disk encryption
gaining illegal access to a computer system
hacking
directory that contains a users personal files
home directory