Computer Security Related Topic Flashcards

1
Q

Software Piracy

A

Is the act of using digital media without copyright approval.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Digital Millennium

A

The DMCA was developed in 1998, and the bill criminalized the production or use if devices and technology designed to bypass copyright measures. In addition, it strengthen existing copyright laws on digital media and the methods through which it can be copied or used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sarbanes-Oxley Act

A

Passed in 2002 and strengthened regulations on electronic financial and data reporting by companies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spam

A

Spam is the use of electronic systems, usually e-mail, to spend bulk messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing

A

A ploy in which a person attempts to gain access to information, usually bank or credit card information, through falsely posing as an authority in an e-mail or re-directed internet website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear-Phishing

A

This is phishing that is deliberately targeting an individual, rather than just sending random Email/phone calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Whaling

A

This phishing attack is usually targeted at executives or those with riches. It is targeted at individuals like spear phishing, but the targets tend to be people with access to sensitive data or great amounts of money.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spoofing

A

Spoofing is generally defined as the use of a forged account, material, or address to send or upload data or messages.

A hack may “spoof” an Email to make it appear to come from someone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pharming

A

Pharming is the redirection of a website to a different, usually fake, website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware

A

Malware is short for malicious software, and includes viruses, worms,Trojan horses, spyware, adware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Computer Viruses

A

Are generally malicious software programs designed in some way to damage a computer. Harmful activities can include stealing CPU and memory resources, corrupting and accessing private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Worms

A

A worm is considered a sub-type of virus. What makes a worm different than a virus is that it spreads itself without attaching to a different program or file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Zombie Computers

A

Zombie Computers are those which have been infected by a virus or other malware on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan Horse

A

A program that acts like an innocent program, but when executed performs some other function besides what it is supposed to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Antivirus

A

A program used to track down and delete malicious programs on a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hacking

A

Generally referred to as the illegal exploitation of security weakness in a computer or network to gain access to a computer or server.

17
Q

Firewall

A

A security system that be either be hardware (a physical piece of firewall equipment) or software (a program that does the same with software instead of hardware.)

18
Q

Encryption

A

Is the ciphering (encryption or translation) of data into a code, which requires a compatible code to decipher it.

19
Q

PGP

A

Stands for “Pretty Good Privacy” and is an encryption used to secure Emails and files.