Chapter 9 - Protecting your System Flashcards
Adware
A program that downloads on your computer when a user installs a freeware program, game or utility
- generally enables sponsored advertisements to appear in a section of a browser window or as a pop-up
Antivirus software
Software specifically designed to detect viruses and protect a computer and files from harm
Backdoor program
A program that enables a hacker to take complete control of a computer without the legitimate user’s knowledge or permission
Backup
A copy of a computer file that can be used to replace the original if it is lost or damaged
Biometric authentication device
A device that uses some unique characteristic of human biology to identify authorized users
Black-hat hacker
A hacker who uses his or her knowledge to destroy information or for illegal gain
Boot-sector virus
A virus that replicates itself into the master boot record of a flash drive or hard drive
Botnet
A large group of software applications that run without user intervention on a large number of computers
Computer forensics
The application of computer system and techniques to gather potential legal evidence
- law enforcement specially used to fight high-tech crime
Cookie
A small text file that some websites automatically store on a client computer’s hard drive when a user visits the site
Cyberloafing
Doing anything with a computer that is unrelated to a job while one is supposed to be working (aka cyberslacking)
Data breach
When sensitive or confidential information is copied, transmitted or viewed by an individual who is not authorized to handle the data
Data file
A file that contains stored data
Denial-of-service (DoS) attack
An attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system that tie up its resources and deny legitimate users access
Distributed denial-of-service (DDoS) attack
An automated attack that is launched from more than one zombie computer at the same time
Drive-by download
The use of malicious software to attack a computer by downloading harmful programs onto a computer, without the user’s knowledge, while they are surfing a website
E-mail virus
A virus transmitted by email that often uses the address book in the victim’s email system to distribute itself
Encryption virus
A malicious program that searches for common data files and compresses them into a file using a complex encryption key, thereby rendering the files unusable
Exploit kits
A software toolkit used to take advantage of security weaknesses found in apps or operating systems, usually to deploy malware
Firewall
A software program or hardware device designed to prevent unauthorized access to computers or networks
Geotag
Data attached to a photograph that indicates the latitude and longitude where you were standing when you took the photo
Grey-hat hacker
A cross between black and white - hacker who will often illegally break into the systems merely to flaunt his or her expertise to the administrator or to attempt to sell his or her services in repairing security breaches
Hacker
Anyone who unlawfully breaks into a computer system
Identity theft
The process by which someone uses personal information about someone else to assume the victim’s identity for the purpose of defrauding another
Image backup
A copy of an entire computer system, created for restoration purposes
Incremental backup
A type of backup that only backs up files that have changed since the last time files were backed up