Computer Security Related Topic Flashcards
Software Piracy
Is the act of using digital media without copyright approval.
Digital Millennium
The DMCA was developed in 1998, and the bill criminalized the production or use if devices and technology designed to bypass copyright measures. In addition, it strengthen existing copyright laws on digital media and the methods through which it can be copied or used.
Sarbanes-Oxley Act
Passed in 2002 and strengthened regulations on electronic financial and data reporting by companies.
Spam
Spam is the use of electronic systems, usually e-mail, to spend bulk messages.
Phishing
A ploy in which a person attempts to gain access to information, usually bank or credit card information, through falsely posing as an authority in an e-mail or re-directed internet website.
Spear-Phishing
This is phishing that is deliberately targeting an individual, rather than just sending random Email/phone calls.
Whaling
This phishing attack is usually targeted at executives or those with riches. It is targeted at individuals like spear phishing, but the targets tend to be people with access to sensitive data or great amounts of money.
Spoofing
Spoofing is generally defined as the use of a forged account, material, or address to send or upload data or messages.
A hack may “spoof” an Email to make it appear to come from someone else
Pharming
Pharming is the redirection of a website to a different, usually fake, website.
Malware
Malware is short for malicious software, and includes viruses, worms,Trojan horses, spyware, adware.
Computer Viruses
Are generally malicious software programs designed in some way to damage a computer. Harmful activities can include stealing CPU and memory resources, corrupting and accessing private information
Worms
A worm is considered a sub-type of virus. What makes a worm different than a virus is that it spreads itself without attaching to a different program or file.
Zombie Computers
Zombie Computers are those which have been infected by a virus or other malware on a network.
Trojan Horse
A program that acts like an innocent program, but when executed performs some other function besides what it is supposed to.
Antivirus
A program used to track down and delete malicious programs on a computer.