Terms Flashcards
A computer that is under the control of a hacker without the owner’s knowledge. Relatively benign. Cripple websites by flooding them with information.
Zombie
Standalone programming that doesn’t need to copy itself to a host or require human interaction to spread. Self replicating malware that duplicates itself to spread to uninflected computers.
Worm virus
A file object that is placed on a web page or in an email message to monitor user behavior. Unlike a cookie, it does not require the user’s permission. Can be detected by looking at the source version of the page to find a tag that loads from a different server than the rest of the page.
Web bugs
Driving around with a laptop to find unsecured wireless LANs to gain free web service or illegal access to an organization’s data.
War driving
Malicious code that copies itself to another program, boot sector, or document and changes how a computer performs.
Virus
Autonomously performs actions such as tweeting, retweeting, liking, etc.
Twitter bot
A malicious program is hidden in an innocent looking email attachment or free game. Unlike a true virus, it cannot replicate itself.
Trojan horse virus
A collection of the most recent web pages and files downloaded from the web. The files are stored in a folder cache so subsequent requests are retrieved from a local hard disk. When the user requests the same page, a request is sent to the website for the date. If it is newer than what is stored, a new page is downloaded. If not, it loads from the hard drive.
Temporary internet files
Spies on your computer. Can capture information like web browsing habits, email messages, usernames and passwords, and credit card information.
Spyware
Tricking or deceiving computer systems or other computer users. Done by hiding one’s identity or faking the identity of another us on the web.
Spoofing
Unsolicited bulk mail messages sent through email.
Spam
Also known as rogue security software. Uses fake error messages to lure you into buying a software program.
Scare ware
A hardware device that routes data from a local area network to another network connection.
Router
A collection of computer software, typically malicious, designed to allow access to areas of its software that would otherwise not be allowed.
Rootkit
Gaining access to the lowest level of an operating system.
Rooting
Also called an evil twin. A fraudulent wifi access point that appears to be legitimate set up to eavesdrop on wireless communications. The wireless LAN equivalent to phishing.
Rogue wifi hotspots
Functions as malevolent software that blocks victims access to computer and demand a ransom be paid.
Ransomeware
Gaining access to a communications channel by using the connection another user already established.
Piggybacking
The attacker tries to learn information such as login or account information by masquerading as a reputable entity or person.
Phishing
Malicious code is installed on a computer, misdirecting users to fraudulent websites without their knowledge or consent.
Pharming
Malicious software, is a program or file that is harmful to a computer user.
Malware
Infect Word and causes a sequence of actions to be performed automatically. Relatively harmless. Random text inserted.
Macro virus
Also called slag code. Delayed action virus or Trojan horse.
Logic bomb
The action of recording or logging the keys struck on a keyboard, so that the person using the keyboard is unaware of it.
Keystone loggers
To remove a restricted mode of operation. May enable content with didn’t allow rights to be used on any computer or third party systems to be run on a mobile device.
Jail breaking
Stealing the identity of others
Identity theft
The output netcdf dataset that the model produces to record the model simulation field with time
History files
The gaining of access (wanted or unwanted) to a computer and viewing, copying, or creating data (leaving a trace), non maliciously
Hacking
Used to refer to someone who can gain unauthorized access to other computers.
Hacker
Rules to control incoming and outgoing network traffic, network security system. Acts as a barrier between a trusted network and an untrusted one.
Firewall
Criminal activity done using computers and the internet.
Cyber crime
A small amount of data generated by a website and saved by your browser. Store login information.
Cookies
A feature of the windows operating system that allows the user to modify system settings and controls.
Control panel
An exploit in which malicious coding is hidden beneath apparently legitimate buttons or other clickable content on a website.
Clickjacking
A group of computers that are controlled from a single source. Usually refers to computers that are affected with malware.
Botnet
Used for short range connections. Based on radio waves. Objects won’t disrupt it.
Bluetooth
Uses certificates to authenticate the user and network
Transport layer security
Wifi protected access 2. Technical term for a network name.
Wpa2
Wifi. Network that provides connectivity to wireless devices in a limited geographic area.
WLAN
Private telecommunications network that interconnects multiple LANs.
WAN
Allows USB drive to be used as memory
Ready boost
Random access memory. Small memory chips. Faster than reading from hard drive.
RAM
Instructions per second in megahertz the computer executes.
Processor speed