Test 1 Flashcards
the amount of data that can be carried over a data network or connection in a fixed amount of time; higher=more data, expressed in bps
bandwidth
a network of zombie computers that can be remotely controlled by a hacker
botnet
the act of using social media to create fake profiles, especially for the purpose of luring unsuspecting victims into online relationships
catfishing
a protocol in which a _____ server assigns IP addresses to computers when they join a network. computer’s IP is not fixed, but can be different every time a computer joins the network
DHCP (dynamic host configuration protocol)
a system for mapping human-friendly names to numeric IP addresses. DNS translates the name into the corresponding IP address. like directory assistance for the internet
DNS (domain name system)
an incident in which a user or organization is deprived of the services of a resource that they would normally expect to have. can target a person or company and are costly. can be politically motivated.
DoS (Denial of Service attack)
computer becomes infected just by visiting a website which contains malicious code, vulnerable servers are searched for. cybercriminals inject their malicious code onto web pages. affects if you are unpatched
drive by download
the number of legs (or hops) a particular packet takes as it moves from its source to its destination. aka number of routers a packet passes through on its journey
hop count
protocol for moving hypertext files and other info across the internet, requires browser on one end and web server on the other. uses tcp/ip services and is most important protocol for world wide web
http (hypertext transfer protocol)
standard internet protocol that routes data packets across multiple nodes and networks on a best effort basis and is unreliable
IP (internet protocol)
standard way of identifying a computer that is connected to the internet
IP address
hijacking and fraudulent use of another person’s personal information without that person’s knowledge
identity theft
the amount of time it takes for a packet of data to get across a network from one point to another
network latency
a unit of data sent across a network, contains destination address, sender’s address, error-control info, and data. layout determined by protocol
packet
use of counterfeit emals and fraudulent websites to fool recipients into disclosing personal financial data such as credit card numbers, usernames and passwords, and social security numbers
phishing
standard set of rules that govern how computers and electronics communicate with one another, define a messages format and how they are exchanged
protocol
intermediate server that sits between clients and the servers those clients use. accepts requests from clients and transmits those requests to the server. prevents clients from accessing prohibited servers, etc.
proxy server
kind of extortion via software, in which a Trojan horse running on a computer will encrypt some files, only to be returned for money
ransomware
software that hides the real screen of a computer to conceal the presence of other intrusive software. may hide some data so its not visible to the user
rootkit
device that interconnects multiple computer networks, read the address info on data packets, which are then forwarded in the appropriate direction. assoc. with IP
router
malware that preys on naïve users, usually reports some nonexistent problem and convinces user to buy a software to “fix” it
scareware
gaining access to systems or data by exploiting human psychology, rather than hacking
social engineering
unsolicited junk messages, typically email, sent indiscriminately to many users at once
spam
a particular, designated victim or organization is targeted with an email customized for them, based on information the sender has gathered
spear phishing
software that gathers information about a computer user and then transmits this info to an external entity without the knowledge or informed consent of the user
spyware
standard internet protocol that converts messages into streams of packets at the source, and reassembles streams of packets
TCP (transmission control protocol)
deceptive program that is presented as somewhat desirable, but is actually destructive with a malicious function
Trojan horse