Info Systems Chapter 2 - Key Terms Flashcards
Cyberterrorist
Someone who intimidates or coerced a government or organization to advance his political or social objectives by launching computer-based attacks against computers, networks, and the info stored on them
Intrusion Detection System (IDS)
Software that monitors system and network resources and notifies network security personnel when it senses a possible intrusion
Keystroke Loggers
Software or hardware programmed to send a list of keystrokes typed by a user to a malicious person
Platform for Privacy Preferences (P3P)
A screening technology that shields users from Web sites that don’t provide the level of privacy protection they desire
Script Bunny
A cracker with little technical savvy who downloads programs called scripts, which automate the job of breaking into computers
Security Dashboard
Software that provides a comprehensive display on a single computer screen of all the vital data related to an organizations security defences, including threats, exposures, policy compliance, and incident alerts