Home
Subjects
Textbook solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Social Science
Sociology
Applied Sociology
chapter 9
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (51)
e-mail virus
virus transmitted by e-mail that often uses the address book in the victims e-mail system to distribute itself
encryption virus
a malicious program that searches for common data files and compresses them into a file using a complex encryption key, thereby rendering the files unusuable
firewall
software program or hardware device designed to prevent unauthorized access to computers or networks
geotag
data attached to a photograph that indicate the latitude and longitude where you were standing when you took the photo
gray hat hackers
a cross between black and white . they will often illegally break into systems merely to flaunt their expertise to the administrator of the system they prenetrated or to attempt to sell their services in repairing security breaches
hacker
anyone who unlawfully breaks into a computer system
hoax
an email message or web site that contains information that is untrue , and is published with the purpose of decieving others
identity theft
the process by which someone uses personal information about someone else name address, and social security number, to assume the victims identity for the purpose of defrauding others
image backup
a copy of a entire computer system created for restoration purposes
incremental backup
a type of backup that only backs up files that have changed since the last time files were backed up
inoculation
a process used by antivirus software; compares old and current qualities of files to detect viral activity
Internet protocol address
the means by which all computers connected to the internet identify eachother. consists of unique set of four numbers seperated by dots
keystroke logger
a type of spyware program that monitors keystokes with the intent of stealing passowrds, logins IDs, or credit card information
logic bomb
computer virus that runs when a certain set of conditions is met, such as when specific dates are reached on the computers internal clock
logical port
virtual communications gateway or path that enables a computer to organize requests for information from other networks or computers
logical port blocking
condition in which a firewall is configured to ignore all incoming packets that request access to a certain port so that unwanted requests will get through to the computer
macro virus
virus that is distributed by hiding it inside a macro
malware
software that is intended to render a system temporarily or permanently useless or to penetrate a computer system completely for purposes of information gathering. examples include spyware, viruses, worms, and trojan horses
master boot record
small program that runs whenever a computer boots up
multipartite virus
literally meaning multipart virus . a type of computer virus that attempts to infect both the boot sector and executable files at the same time
network address translation
a process that firewalls use to assign internal internet protocol addresses on a network
packet
small segment of data the that is bundled for sending over transmission media. each packet contains the address of the computer or peripheral device to which it is being sent
packet analyzier
computer hardware device or software program designed to detect anf record digital information being transmaitted over a network
packet filtering
a feature found in firewalls that filters out unwanted data packets sent to specific logical ports
personal firewall
firewall specifically designed for home networks
pharming
planting malicious code on a computer that alters the browsers ability to find web addresses and directs users to bogus web sites
phishing
process of sending e-mail messages to lure internet users into
polymorphic virus
virus that changes its virus signature every time it infects a new file . this makes it more difficult for antivirus programs to detect the viruses
pretexting
the act of creating and invented scenario to convince someone to divulge information
program file
a file that is used in the running of software programs and does not store data
quarantining
placement of computer virus in a secure are on the hard drive so that it wont spread infection to other files
rootkit
programs that allows hackers to gain access to your computer and take almost complete control of it without your knowledge. these programs are designed to subvert normal logon procedures to a computer and to hide their operations from normal detection methods
scareware
type of malware that is downloaded onto your computer and tries to convince you that your computer is infected with a virus or other tpe of malware
script
list of commands that can be executed on a computer without user interaction
social engineering
any techniques that uses social skills to generate human interactions for the purpose of enticing individuals to reveal sensitive infromation
spam
unwanted or junk mail
spam filter
option you can select that places known or suspected spam messages into a folder other than your inbox
spear phishing
a targeted phising attack that sends emails to people known to be customers of a company
spyware
unwanted piggyback program that downloads witht he software you want to install from the internet and then runs in te background of your system
stealth virus
virus that temporarily erases its code from the files where it resides and hides in the active memory of the computer
surge protector
device that protects computers and other electronic devices from power surges
time bomb
a virus that is triggered by the passage of time or on a certain date
trojan horse
computer program that appears to be something something useful or desirable , but at the same time does something malicious in the background without the user's knowledge
uninterruptible power supply
device designed to power a computer from large batteries for a brief period during a loss of electrical power
urban legend
hoax that becomes s well known that it is accepted by society as true even though it is false.
virus
computer program that attaches itself to another computer program and attempts to spread itself to toher computers when files are exchanged
virus signature
portion of the virus code that is unique to a particular computer virus and makes it identifiable by antivirus software
white hat hacker
hacker who breaks into systems just for a challenge. help companies realize vulnerablities
whole house surge protector
surge protector that is installed on the breaker panel of a home and protects all electronic devices in the home from power surges
worm
program that attempts to travel between systems through network connections to spread infections. worms can run independently of host file execution and are active in spreading themselves
zombie
a computer that is controlled by a hacker who uses it to launches attacks on other computer systems
Sets with similar terms
CGS chapter 9
68 terms
Technology in Action: Chapter 9
69 terms
Technology In Action Ch. 9
66 terms
CGS2060 Chapter 9
69 terms
Sets found in the same folder
Chapter 9 true/false
15 terms
Chapter 9 Practice Multiple Choice
30 terms
Technology in Action Chapter 10
45 terms
Chapter 7: Networking: Connecting Computing Devices
45 terms
Other sets by this creator
Hopkins Exam 4 MAR3231
46 terms
Sales Exam 1
12 terms
Communications 2
18 terms
Communications 1
53 terms
Verified questions
SOCIOLOGY
The sinking of the luxury liner Titanic offers some insights into social class. Among first class passengers, only 3 percent of the women died, and none of the children died. Among third-class passengers, 45 percent of the women died, and 70 percent of children died. In all 76 percent of the third-class passengers died, compared with 40 percent of the first-class passengers. What implications would you draw from these numbers? Is it important to know that the third-class passengers were restricted to the lower decks and thus farther away from the lifeboats?
SOCIOLOGY
How is the material culture influenced by the nonmaterial culture?
SOCIOLOGY
Which unemployment rate do most economists consider to be acceptable in the United States?
SOCIOLOGY
Summarize in one sentence the overall attitude of the conflict perspective toward sport.
Other Quizlet sets
Chapter 11 - marine reptiles, birds, and mammals
19 terms
Cancer therapy
19 terms
physical science lab eq
60 terms
8th Grade ch. 9, 10, Lent
46 terms
Related questions
QUESTION
You are developing a security plan for your organization. What is an example of physical control?
QUESTION
What is the one thing that you can do to verify the protection of your files? & What device could you use to broadcast your wireless network over a larger area?
QUESTION
assign roles and privileges to users so that only job-relevant data is accessible to the user
QUESTION
What is the term for how 'firms that locate proximate to each other are able to reduce operational costs by sharing resources and/or increasing the efficiency of their coordination'?