Terms Flashcards

1
Q

A computer that is under the control of a hacker without the owner’s knowledge. Relatively benign. Cripple websites by flooding them with information.

A

Zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Standalone programming that doesn’t need to copy itself to a host or require human interaction to spread. Self replicating malware that duplicates itself to spread to uninflected computers.

A

Worm virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A file object that is placed on a web page or in an email message to monitor user behavior. Unlike a cookie, it does not require the user’s permission. Can be detected by looking at the source version of the page to find a tag that loads from a different server than the rest of the page.

A

Web bugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Driving around with a laptop to find unsecured wireless LANs to gain free web service or illegal access to an organization’s data.

A

War driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malicious code that copies itself to another program, boot sector, or document and changes how a computer performs.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Autonomously performs actions such as tweeting, retweeting, liking, etc.

A

Twitter bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A malicious program is hidden in an innocent looking email attachment or free game. Unlike a true virus, it cannot replicate itself.

A

Trojan horse virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A collection of the most recent web pages and files downloaded from the web. The files are stored in a folder cache so subsequent requests are retrieved from a local hard disk. When the user requests the same page, a request is sent to the website for the date. If it is newer than what is stored, a new page is downloaded. If not, it loads from the hard drive.

A

Temporary internet files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spies on your computer. Can capture information like web browsing habits, email messages, usernames and passwords, and credit card information.

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tricking or deceiving computer systems or other computer users. Done by hiding one’s identity or faking the identity of another us on the web.

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unsolicited bulk mail messages sent through email.

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Also known as rogue security software. Uses fake error messages to lure you into buying a software program.

A

Scare ware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A hardware device that routes data from a local area network to another network connection.

A

Router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A collection of computer software, typically malicious, designed to allow access to areas of its software that would otherwise not be allowed.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Gaining access to the lowest level of an operating system.

A

Rooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Also called an evil twin. A fraudulent wifi access point that appears to be legitimate set up to eavesdrop on wireless communications. The wireless LAN equivalent to phishing.

A

Rogue wifi hotspots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Functions as malevolent software that blocks victims access to computer and demand a ransom be paid.

A

Ransomeware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Gaining access to a communications channel by using the connection another user already established.

A

Piggybacking

19
Q

The attacker tries to learn information such as login or account information by masquerading as a reputable entity or person.

20
Q

Malicious code is installed on a computer, misdirecting users to fraudulent websites without their knowledge or consent.

21
Q

Malicious software, is a program or file that is harmful to a computer user.

22
Q

Infect Word and causes a sequence of actions to be performed automatically. Relatively harmless. Random text inserted.

A

Macro virus

23
Q

Also called slag code. Delayed action virus or Trojan horse.

A

Logic bomb

24
Q

The action of recording or logging the keys struck on a keyboard, so that the person using the keyboard is unaware of it.

A

Keystone loggers

25
To remove a restricted mode of operation. May enable content with didn't allow rights to be used on any computer or third party systems to be run on a mobile device.
Jail breaking
26
Stealing the identity of others
Identity theft
27
The output netcdf dataset that the model produces to record the model simulation field with time
History files
28
The gaining of access (wanted or unwanted) to a computer and viewing, copying, or creating data (leaving a trace), non maliciously
Hacking
29
Used to refer to someone who can gain unauthorized access to other computers.
Hacker
30
Rules to control incoming and outgoing network traffic, network security system. Acts as a barrier between a trusted network and an untrusted one.
Firewall
31
Criminal activity done using computers and the internet.
Cyber crime
32
A small amount of data generated by a website and saved by your browser. Store login information.
Cookies
33
A feature of the windows operating system that allows the user to modify system settings and controls.
Control panel
34
An exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
Clickjacking
35
A group of computers that are controlled from a single source. Usually refers to computers that are affected with malware.
Botnet
36
Used for short range connections. Based on radio waves. Objects won't disrupt it.
Bluetooth
37
Uses certificates to authenticate the user and network
Transport layer security
38
Wifi protected access 2. Technical term for a network name.
Wpa2
39
Wifi. Network that provides connectivity to wireless devices in a limited geographic area.
WLAN
40
Private telecommunications network that interconnects multiple LANs.
WAN
41
Allows USB drive to be used as memory
Ready boost
42
Random access memory. Small memory chips. Faster than reading from hard drive.
RAM
43
Instructions per second in megahertz the computer executes.
Processor speed