Chapter 5 Definitions Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Define internet

A

The world-wide interconnection of networks; the internet makes use of TCP and IP protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define World Wide Web

A

A massive collection of web pages and is based on hypertext transfer protocols (http and https)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define (web) browser

A

Software that connects to a domain name server (DNS) to locate IP addresses; a browser interprets HTML web pages sent to a user’s computer so that the user can read documents and watch multimedia

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define HTML

A

Hyper Text Mark-up Language - the language used to design, display and format web pages, and to write http(s) protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define URL

A

Uniform Resource Locator - a text-based address for a web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define https

A

Hyper Text Transfer Protocol Secure - http with extra security (such as SSL) applied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define hyperlink

A

Highlighted text or an image that is activated by clicking and links to further text, images, a web page or a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define DNS

A

Domain Name Server - a server that looks up domain names for websites in order to find the IP addresses that a computer needs to locate the web servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define cookie

A

A text file sent from a website to a user’s browser; it is used to remember user preferences each time they visit the website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define user preferences

A

Settings or options stored in cookies that can remember customised web pages or indicate browsing history to target adverts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define session cookie

A

A cookie that is stored temporarily on a computer; it is deleted when the browser is closed or the website session ends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define persistent cookie

A

A cookie that is stored on the user’s hard drive and only deleted when the expiry date is reached or the cookie is deleted by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define virtual shopping basket

A

An area of memory in a website where items a user wishes to purchase are temporarily stored; items remain in the basket until payment is made or the session has ended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define digital currency

A

Currency that exists in electronic form only; it has no physical form and is essentially data on a database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define cryptocurrency

A

A form of digital currency that uses a chain of decentralised computers to control and monitor transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define cryptography

A

The protection of data/information by use of coding; it usually involves encryption and decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define blockchain

A

A decentralised database where all transactions are stored; it consists of a number of interconnected computers but not a central server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define timestamp

A

A digital record of the date and time that a data block is created in blockchain networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define proof-of-work

A

The algorithm used in blockchain networks to confirm a transaction and to produce new blocks to add to the chain; special users called miners complete and monitor transactions on the network for a reward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define brute force attack

A

A ‘trial and error’ method used by cybercriminals to crack passwords by finding all possible combinations of letters, numbers and symbols until the password is found

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define word list

A

A text file containing a collection of words used in a brute force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define data interception

A

An attempt to eavesdrop on a wired or wireless network transmission; cybercriminals often use packet sniffing or access point mapping / wardriving to intercept data

23
Q

Define packet sniffing

A

A method used by a cybercriminal to examine data packets being sent over a network and to find the contents of a data packet, which are sent back to the cybercriminal

24
Q

Define wardriving

A

Using a laptop, antenna, GPS device and software to intercept Wi-Fi signals and illegally obtain data; sometimes called Access Point Mapping

25
Q

Define wired equivalency privacy (WEP) encryption protocol
security

A

An algorithm for wireless networks to protect them against data interception

26
Q

Define denial of service (DoS) attack

A

A cyberattack in which cybercriminals seek to disrupt the normal operation of a website by flooding it with requests; also used to clog up a user’s mailbox by sending out thousands of spam emails

27
Q

Define distributed denial of service (DDoS) attack

A

A denial of service (DoS) attack in which the fake requests come from many different computers, which makes it harder to stop

28
Q

Define spam

A

Unsolicited emails sent to a user’s mailbox

29
Q

Define hacking

A

The act of gaining illegal access to a computer system without the owner’s permission

30
Q

Define malware

A

Programs (such as viruses, worms and Trojan horses) installed on a user’s computer with the aim of deleting, corrupting or manipulating data illegally

31
Q

Define virus

A

A program or program code that replicates itself with the intention of deleting or corrupting files or by causing the computer system to malfunction

32
Q

Define active host

A

Functioning software that a virus can affect by attaching itself to the code or by altering the code to allow the virus to carry out its attack

33
Q

Define worm

A

A stand-alone type of malware that can self replicate; unlike viruses, worms don’t need an active host; they can spread throughout a network without the need for any action by an end-user

34
Q

Define Trojan horse

A

A type of malware that is designed to look like legitimate software but contains malicious code that can cause damage to a computer system

35
Q

Define spyware

A

A type of malware that gathers information by monitoring a user’s activities on a computer and sends the gathered information back to the cybercriminal who sent out the spyware

36
Q

Define adware

A

a type of malware that attempts to flood the end user with unwanted advertising

37
Q

Define ransomware

A

A type of malware that encrypts data on a user’s computer and ‘holds the data hostage’ until a ransom is paid

38
Q

Define phishing

A

Sending out legitimate-looking emails designed to trick the recipients into giving their personal details to the sender of the email

39
Q

Define spear phishing

A

Similar to phishing but targeting specific people or organisations rather than carrying out a blanket attack

40
Q

Define pharming

A

Redirecting a user to a fake website in order to illegally obtain personal data about the user without their knowledge; unlike phishing, pharming is initiated without needing any action by the user

41
Q

Define DNS cache poisoning

A

Altering IP addresses on a domain name server (DNS) with the intention of redirecting a user’s browser to a fake website; carried out by a pharmer or hacker

42
Q

Define social engineering

A

Manipulating people into breaking normal security procedures in order to gain illegal access to computer systems or to place malware on their computer

43
Q

Define access levels

A

Different levels of access in a computer system allowing a hierarchy of access levels depending on user’s level of security

44
Q

Define anti-spyware

A

Software that detects and removes spyware programs installed on a system; the software is based on typical spyware rules or known file structures

45
Q

Define authentication

A

The process of proving a user’s identity by using something they know, something they have or something unique to them

46
Q

Define biometrics

A

Type of authentication that uses a unique human characteristic, such as fingerprints, voice or retina blood vessel pattern

47
Q

Define two-step verification

A

A type of authentication that requires two methods of verification to prove the identity of a user

48
Q

Define patch

A

An update for software that is developed to improve the software and/or to remove any bugs

49
Q

Define typo squatting

A

The use by cybercriminals of subtle spelling errors in website addresses used to trick users into visiting their fake websites

50
Q

Define firewall

A

Software or hardware that sits between a computer and an external network; the firewall monitors and filters all incoming and outgoing traffic

51
Q

Define proxy server

A

A server that acts as an intermediary server through which internet requests are processed; it often makes use of cache memory to speed up web page access

52
Q

Define privacy settings

A

Controls available on social networking and other websites which allow users to limit who can access their profile or what they are allowed to see

53
Q

Define secure sockets layer (SSL)

A

A security protocol used when sending data over a network (such as the internet)

54
Q

Define SSL certificate

A

A form of digital certificate which is used to authenticate a website; providing the SSL certificate can be authenticated, any communication or data exchange between browser and website is secure