Unit 3 - Chapter 8 Flashcards

1
Q

Authentication

A

The process of verifying that you really are the person who has the right to access this computer, whether it is your local machine or the Web server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hash function

A

The hash function takes the password the user originally chooses, chops it up, and stirs it around according to a given formula.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

password-cracking software

A

For a given-user ID, will first try all words in its built-in dictionary encrypting each with the well-known hash function and comparing the result with the password file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Social engineering

A

is the process of using people to get the information you want.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authorization

A

governs what an authenticated user is allowed to do.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

System administrator or superuser

A

has access to everything, and is the person who sets up the authorization privileges for all other users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virus

A

A virus is a computer program that, like a biological virus, infects a host computer and then spreads. It embed itself within another program or file. When that program or file is activated, the virus copies itself and attacks other files on the system. The results may be as simple as taunting pop-up messages, but could also include erratic behaviour or drastic slowdown of the computer, corrupted deleted files, loss of data, or system crashes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Worm

A

A worm is very similar to a virus, but it can send copies of itself to other nodes on a computer network without having to be carried by an infected host file. It is a self-replicating piece of software that can travel from node to node without any human intervention.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trojan Horse

A

A trojan horse ( in the software world) is a computer program that does some harmless little job but also unbeknownst to the user, contains code to perform the same kinds of malicious attacks as viruses and worms - corrupt or delete files, capture the user’s address book to send out spam e-mail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

keystroke logger

A

captures the user’s passwords and credit card numbers ( and sends them to someone else) or even put the computer under someone else’s remote control at some point in the future.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Denial of service ( DOS) attack

A

is typically directed at business or government website. The attack automatically directs browsers, usually on many machines, to a single URL, at roughly the same time. The result causes so much network traffic to the targeted site that it is effectively shut down to legitimate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

zombie army or botnet

A

A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform Distributed Denial-of-Service attacks, steal data, send spam, and allow the attacker to access the device and its connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phishing

A

is a practice used to illegally obtain sensitive information such as credit card numbers, account numbers and passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Antivirus softwares

A

Such software can detect worms, viruses, and trojan horses by distinctive “ signatures” those programs carry. It cleans your machine of infected files. Most antivirus software come with a feature for automatic updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Firewall software

A

guards the access points to your computer blocking communications to or from sites you don’t permit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Antispyware

A

routinely scans your computer for any “ spyware” programs that may have infected your machine - programs that capture information on what Websites you have visited and what passwords and credit card numbers you have used.

17
Q

Security patches

A

install these patches or updates to your operating system as all operating systems are vulnerable.

18
Q

Criptography

A

is the science of “ secret writing”

19
Q

Encryption

A

is the process of using an algorithm to convert information into a representation that cannot be understood or utilized by anyone without the appropriate decryption algorithm;

20
Q

Decryption

A

is the reverse of encryption, using an algorithm that converts the ciphertext back into plain text.

21
Q

Symmetric encryption algorithm

A

requires the use of a secret key known to both the sender and the receiver.

22
Q

Asymmetric encryption algorithm

A

also called a public key encryption algorithm, the key for encryption and the key for decryption are quite different although related.

23
Q

Caesar cipher

A

also called a shift cipher, involves shifting each character in the message to another character some fixed distance farther along in the alphabet.

24
Q

Stream cipher

A

it encodes one character at a time.

25
Q

block cipher

A

a group or block of plaintext letters gets encoded into a block of ciphertext, but not by substituting one character at a time for each letter.

26
Q

DES ( Data Encryption Standard)

A

is an encryption algorithm developed by IBM in the 1970s for the US NAtional Bureau of Standards ( now called the US NAtional Institute of Standards and Technology, or NIST). It is certified as an international standards by the International Organization for Standardization ( ISO) the same organizations that certifies the MP3 digital audio format.

27
Q

Steganography

A

is the practice of hiding the very existence of a message

28
Q

AES ( Advanced Encryption Standards)

A

uses successive rounds of computations that mix up the data and the key. The ley length can be 128,192, or even, 256 buts and the algorithm appears to be very efficient.

29
Q

prime number

A

an integer greater than 1 that can only be written as the product of itself and 1

30
Q

SSL ( Secure Sockets Layer)

A

is a series of protocols developed by Netscape Communications

31
Q

TLS ( Transport Layer Security ) protocol

A

first defined in 1999, is based on SSL and is nearly identical to SSL. TLS has a few technical security improvements over SSL, but the major difference is that TSL is nonproprietary and is a standard supported by the Internet Engineering Task Force ( IETF).

32
Q

Handshake

A

the exchange of setup information between the client and server, preparatory to exchanging real data.

33
Q

Embedded computers

A

computational devices such as chips, processors, or computers that are embedded within another system.