Security and Maintenance Flashcards
People who try to gain unauthorized access to computer systems.
Employ many different methods to obtain what they want.
Hackers
Use a minimum of SIX characters, EIGHT or more characters is even better,
with 15 characters considered the most secure.
Password
It is a malicious program designed to take control of system operations, and
damage or destroy data.
Virus
It is a self-replicating program that consumes system and network resources.
Worm
It is a program designed to allow a hacker remote access to a
target computer system.
Trojan (Trojan Horse)
It is a program designed to allow a hacker remote access to a
target computer system.
Spyware
It is a software application that automatically displays or downloads
advertisements.
Adware
It is a small text file placed on your computer by a Web server.
Cookie
It is the practice of tricking users into giving out passwords or other
types of access information.
Social Engineering
It is the process of trying to gather sensitive information such as a password, or
credit card details from an unsuspecting victim by pretending to be a trustworthy
entity.
Phishing
It is used to scan your computer for known
viruses, and to eliminate any viruses that are discovered.
Antivirus Software
It is a security barrier that filters and controls the flow of information coming
into and out of a private network.
Firewall
Firewalls can also be implemented through software known as BLANK
Personal Firewalls
It offers many firewall features, such as inspection of all incoming
transmissions for security threats.
Desktop Firewalls
While you are browsing the Internet, the Address bar in your browser
uses the BLANK. This protocol is used for
normal web site activity, such as browsing and navigating. It is not a
secure protocol.
Hypertext Transfer Protocol (http)