Upgrade to remove ads
shat from Snap
Terms in this set (47)
A(n) _____ is a highly targeted, sophisticated attack tailored to a specific organization, usually to gain access to sensitive information.
n important part of computer security is _____, which involves minimizing the risk of loss or theft of data from within a network.
data loss prevention
_____ is a protocol that protects data such as credit card numbers as they are being transmitted between a customer and an online vendor.
transport layer security (TLS)
In what way is a worm different from a virus?
does not require the user to do anything
company owned networks, private internet with the corporations "walls"
logic bomb virus
A piece of code that is placed in a software system to set off a series of potentially damaging events if certain conditions are met.
Mass emails sent to those who haven't requested them, usually for the purpose of advertising or fraud.
A type of computer program that is placed on your computer without your knowledge. The key characteristic of a virus is that it can reproduce itself and spread from computer to computer by attaching itself to another, seemingly innocent, file.
A set of programs or utilities designed to allow a hacker to control a victim computer's hardware and software and permit a hacker to monitor the user's actions.
A group of computers that have been compromised (zombies or bots) so they can forward communications to a controlling computer.
A scam where an online warning or popup convinces a user that his or her computer or mobile device is infected with malware or has another problem that can be fixed by purchasing and downloading software, which may do nothing or install malware.
Software that is supported by advertising and is capable of downloading and installing spyware.
Software that tracks activities of a computer user without the user's knowledge.
A form of virus that infects the data files of commonly used applications such as word processors and spreadsheets.
Malware that masquerades as a useful program. When you run the seemingly useful program, you let this type of malware into your system. It opens a "back door" through which hackers can access your computer.
A self-replicating computer program with the ability to send out copies of itself to every computer on a network. Worms are usually designed to damage the network, in many cases by simply clogging up the network's bandwidth and slowing its performance.
social bookmarking website that allows signed up users to bookmark and tag web pages
A computer or other device capable of sending data to and receiving data from a server on a network.
Any combination of hardware and software that provides a service, such as storing data, to a client, such as your computer.
A transmission medium that uses a protected string of glass that transmits beams of light. Fiber-optic transmission is very fast, sending billions of bits per second.
the cable used to transmit cable television signals over an insulated wire at a fast speed (millions of bits per second).
Allow different devices to talk to one another. Standards ensure compatibility among devices, specifying how computers access transmission media, the speeds used on networks, the design of networking hardware such as cables, and so on.
A network protocol that offers short-range connectivity (3 to 300 feet, depending on a device's power class) via radio waves between devices such as cell phones and cars. Bluetooth-enabled devices can communicate directly with each other.
In the context of a computer network, a system that includes sending and receiving hardware, transmission and relay systems, common sets of standards so all the equipment can "talk" to each other, and communications software.
A type of cable consisting of two independently insulated wires twisted around one another. This type of cable is used to transmit signals over short distances and is used to connect a home's hardware telephone system or an Ethernet network, for example.
The number of bits (pieces of data) per second that can be transmitted over a communications medium.
A type of software used to create documents that include sophisticated text formatting, tables, photos, drawings, and links to online content.
personal information manager
calendar, task manager, contact manager, note taking, journal, and web browsing
vector graphics editor
proprietary web development tool
database management system
creates proxy files for high definition editing
The ability to share the Internet connection of a mobile device with another device via a cable, Bluetooth, or Wi-Fi.
radio frequency identification (RFID)
A wireless technology primarily used to track and identify items using radio signals. An RFID tag placed in an item contains a transponder which is read by a transceiver or RFID reader.
Wireless application protocol (WAP)
Specifies how mobile devices such as cell phones display online information, such as maps and email.
network interface card (NIC)
supports ethernet, adapter card to connect to a network
hub Used on older LAN networks to coordinate the message traffic among nodes connected to a network.
A hardware device that joins several computers together to coordinate message traffic in one LAN network. Although a switch performs a role similar to a hub, a switch checks the data in a packet it receives and sends the packet to the correct destination using the fastest route.
A device that helps separate, UNSIMILAR networks to communicate with each other.
A device that helps separate, SIMILAR networks to communicate with each other.
public key encryption involves the use of a ________ to_______ data and a ________ to ____it
involves the use of a PUBLIC KEY to ENCRYPT data and a PRIVATE KEY to DECRYPT it
three popular forms of encryption
WPA (wifi protected access)
WPA2 (wifi protected access 2)
WEP (wired equivalent privacy)
A system of encrypting and decrypting data where in the sending and receiving computers each have a matching private key.
A spare server used to take over server functions.
A server activated periodically to get backup files from the main server.
A spare server that receives frequent updates and is available to take over if the server it mirrors fails.
THIS SET IS OFTEN IN FOLDERS WITH...
Chap 1- Programming
Chap 2- The internut
Chap 3- Network Compooting
Chap 4- the social web
YOU MIGHT ALSO LIKE...
CIS Ch 5 terms
Computer Security - Everything and secur…
OFM 101 - Pt. 1 Ch 7 - Computer Security…
OTHER SETS BY THIS CREATOR
MicroBeep Quiz 3