Chapter 5 Notes Pt. 1 Flashcards
a group of compromised computers or mobile devices connected to a network
botnet
A botnet composed computer or device is known as a ________
zombie
_______ ___ _______ _______ (____ _______) disrupts computer access to Internet services
denial of service attack (DoS attack)
a program or set of instructions in a program that allow users to bypass security controls
back door
a technique intrudes use to make their network or Internet transmission appear legitimate
spoofing
hardware and/or software that protects a network resources form intrusion
firewall
What is the difference between unauthorized access and unauthorized use?
unauthorized access- the use of a computer or network without permission
unauthorized use- the use of a computer or its data for unapproved or possibly illegal activities
To protect files on your local hard disk from hackers and other intrudersm turn off ___ and _______ _______ on your Internet connection
file
printer
sharing
a security measure that defines who can access a computer, device, or network
access control
Access control defines:
(1) who can access a computer
(2) when they can access it
(3) what actions can be taken while accessing it
a unique combination of characters that identifies one specific user
user name
a private combination of characters associated with the user name that allows access to certain computer resources
password
A ___________ ________ is any item that you can, to gain access to a computer or computer facility
posessed object
A posessed object can often be used in combination with a ____ (_________ ____________ _________)
PIN (personal identification number)
authenticates a person’s identity by translating a personal characteristics into a digital code that is compared with a digital code in a computer
biometric device