ITGS Ch. 9 1-64 Terms Flashcards

1
Q

Adware

A

A program that downloads on your computer when a user installs a freeware program, game, or utility; generally enables sponsored advertisements to appear in a section of a browser window or as a pop-up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Antivirus software

A

Software specifically designed to detect viruses and protect a computer and files from harm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Backdoor program

A

Enables a hacker to take complete control of a computer without the legitimate user’s knowledge or permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Backup

A

A copy of a computer file that can be used to replace the original if its lost or damaged

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Biometric authentication device

A

Device that uses some unique characteristic of human biology to identify authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Black-hat hacker

A

A hacker who uses his or her knowledge to destroy information or for illegal gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Boot-sector virus

A

A virus that replicates itself into the master boot record of a flash drive or hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Botnet

A

A large group of software applications (called robots or bots) that run without user intervention on a large number of computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computer forensics

A

The application of computer systems and techniques to gather potential legal evidence; a law enforcement specialty used to fight high-tech crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cookie

A

A small text file that some websites automatically store on a client computer’s hard drive when a user visits the site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cybercrime

A

Any criminal action perpetrated primarily through the use of a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cybercriminal

A

An individual who uses computers, networks, and the Internet to perpetrate crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cyberfloating / Cyberslacking

A

Doing anything with a computer that’s unrelated to a job (such as playing video games) while one’s supposed to be working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data breach

A

When sensitive or confidential information is copied, transmitted, or viewed by a individual who is not authorized to handle the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data file

A

A file that contains stored data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Denial-of-service (DoS) attack

A

An attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system that tie up its resources and deny legitimate users access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Distributed denial-of-service (DDoS) attack

A

An automated attack that launched from more than one zombie computer at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Drive-by download

A

The use of malicious software to attack a computer by downloading harmful programs onto a computer, without the user’s knowledge, while they are surfing a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

E-mail virus

A

A virus transmitted by e-mail that often uses the address book in the victim’s e-mail system to distribute itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Encryption virus

A

A malicious program that searched for common data files and compresses them into a file using a complex encryption key, thereby rendering the files unusable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Firewall

A

A software program or hardware device designed to prevent unauthorized access to computers or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Geotag

A

Data attached to a photograph that indicates the latitude and longitude where you were standing when you took the photo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Grey-hat hacker

A

A cross between black and white - a hacker who will often illegally break into systems merely to flaunt his or her expertise to the administrator of the system he or she penetrated or to attempt to sell his or her services in repairing security breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Hacker

A

Anyone who unlawfully breaks into a computer system (whether an individual computer or a network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Identity theft

A

The process by which someone uses personal information about someone else (such as the victim’s name, address, and Social Security number) to assume the victim’s identity for the purpose of defrauding another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Image backup (system backup)

A

A copy of an entire computer system, created for restoration purposes

27
Q

Incremental backup (partial backup)

A

A type of backup that only backs up files that have changed since the last time files were backed up

28
Q

Inoculation

A

A progress that used by antivirus software; compares old and current qualities of files to detect viral activity

29
Q

Keystroke logger (keylogger)

A

A type of spyware program that monitors keystrokes with the intent of stealing passwords, login IDs, or a credit card information

30
Q

Logical port

A

A virtual communications gateway or path that enables a computer to organize requests for information (such as web pages downloads and e-mail routing) from other networks or computers

31
Q

Logical port blocking

A

A condition in which a firewall in configured to ignore all incoming packets that request access to a certain port so that no unwanted requests will get through to the computer

32
Q

Logic bomb

A

A computer virus that runs when a certain set of conditions are met, such as when a program is launched a specific number of times

33
Q

Macro virus

A

A virus that’s distributed by hiding it inside a macro

34
Q

Malware

A

Software that’s intended to render a system temporarily or permanently useless or to penetrate a computer system completely for purposes of information gathering (ex. spyware, viruses, worms, and Trojan horses)

35
Q

Master boot record

A

A small program that runs whenever a computer boots up

36
Q

Multipartite virus

A

A type of computer virus that attempts to infect computers using more than one method

37
Q

Network address translation (NAT)

A

A process that firewalls use to assign internal Internet protocol addresses on a network

38
Q

Packet analyzer (sniffer)

A

A computer hardware device or software program designed to detect and record digital information being transmitted over a network

39
Q

Packet filtering

A

The process of passing or blocking packets at a network interface based on source and destination addresses, ports, or protocols; used in conjunction with NAT

40
Q

Personal firewall

A

A firewall specifically designed for home networks

41
Q

Pharming

A

Planting malicious code on a computer that alters the browser’s ability to find web addresses and that directs users to bogus websites

42
Q

Phishing

A

The process of sending e-mail messages to lure Internet users into revealing personal information such as credit card of Social Security numbers or other sensitive information that could lead to identity theft

43
Q

Polymorphic virus

A

A virus that changes its virus signature (the binary pattern that makes the virus identifiable) every time it infects a new file; makes it more difficult for antivirus programs to detect the virus

44
Q

Pretexting

A

The act of creating an invented scenario to convince someone to divulge information

45
Q

Program file

A

Files that are used in running of software programs and that do not store data

46
Q

Quarantining

A

The placement (by antivirus software) of a computer virus in a secure area on the hard drive so that it won’t spread infection to other files

47
Q

Rootkit

A

Program that allows hackers to gain access to your computer and take almost complete control of it without your knowledge; designed to subvert normal login procedures to a computer and to hide their operations from normal detection methods

48
Q

Scareware

A

A type of malware that’s downloaded onto your computer and that tries to convince you that your computer is infected with a virus or other type of malware

49
Q

Script

A

A list of commands (mini-programs or macros) that can be executed on a computer without user interaction

50
Q

Social engineering

A

Any technique that uses social skills to generate human interaction for the purpose of enticing individual to reveal sensitive information

51
Q

Spam

A

Unwanted or junk e-mail

52
Q

Spam filter

A

An option you can select in your e-mail account that places known or suspected spam messages into a folder other than your inbox

53
Q

Spear phishing

A

A targeting attack that sends e-mails to people known to be customers of a company; have a much greater chance of successfully getting individual to reveal sensitive data

54
Q

Spyware

A

An unwanted piggyback program that downloads with the software you want to install from the Internet and then runs in the background of your system

55
Q

Stealth virus

A

A virus that temporarily erases its code from the files where it resides and hides in the active memory of the computer

56
Q

Surge protector

A

A device that protects computers and other electronic devices from power surges

57
Q

Time bomb

A

A virus that’s triggered by the passage of time or on a certain date

58
Q

Trojan horse

A

A computer program that appears to be something useful or desirable (such as a game or a screen saver), but at the same time does something malicious in the background without the user’s knowledge

59
Q

Virus

A

A computer program that attaches itself to another computer program (known as the host program) and attempts to spread itself to other computers when files are exchanged

60
Q

Virus signature

A

A portion of the virus code that’s unique to a particular computer virus and that makes it identifiable by antivirus software

61
Q

White-hat hacker (ethical hacker)

A

A hacker who breaks into systems just for the challenge of it (who doesn’t wish to steal or wreak havoc on the systems); tout themselves as experts who are performing a needed service for society by helping companies realize the vulnerabilities that exist in their systems

62
Q

Whole-house surge protector

A

Installed on (or near) the breaker panel of a home and that protects all electronic devices in the home from power surges

63
Q

Worm

A

A program that attempts to travel between systems through network connection to spread infections; run independently of host file execution and are active in spreading themselves

64
Q

Zombie

A

A computer that’s controlled by a hacker who uses it to launch attacks on other computer systems