Study sets, textbooks, questions
Upgrade to remove ads
1.6 System Security
Terms in this set (32)
The overall term for all types of 'malicious software'.
Malicious software that attaches itself to programs or files on a computer or server. It can causes documents/programs to be corrupted or deleted.
Malicious software that copies itself in order to spread to other computers. Unlike a virus, it does not need to attach to a program.
Malicious software that is designed to access a computer by misleading users of its intent.
People are the 'weak point' in computer systems. Criminals use our weaknesses as a way of spreading viruses or stealing information.
Emails sent pretending to be from genuine companies trying to steal data.
brute force attacks
A trial and error method used for gaining access to password based entry systems.
denial of service attacks (DOS)
When a website is overloaded with unwanted traffic from a single source trying to stop the website from working..
data interception and theft
Data travels across networks in packets. Packets can be intercepted
If packets are encrypted, they cannot be read without a key.
Where an attacker uses SQL wildcards on website user input boxes to try to gain access to the databases behind the website.
Involves the examination of data sent across a network. Looking for unusual patterns or times of high network traffic.
Inspecting information packets as they travel around networks
Professional hacking to identify and repair network vulnerabilities.
Software with the aim of preventing malware from entering the system.
Part of a computer system that is designed to block unauthorized access from outside the network
A set of policies that govern how a network is managed and used.
user access levels
Controls what files or areas of the network different groups of users can access.
Typically a string of characters used to gain access to a service or system.
Can be used in addition to 'standard' password entry e.g. retina scan, fingerprint, voice, facial recognition.
A password that contains a specific amount of characters with mixed cases and often requires letters and numbers.
Process of converting readable data into unreadable characters to prevent unauthorised access.
A type of Malware that locates and saves data from users without them knowing about it.
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
A test created by software developers that the visitor must pass before continuing to register or enter a website; designed to thwart software bots.
Two factor authentication
Validating user identity with two means of identification - usually a password and a code sent to a smartphone.
automatic software updates
A method of keeping software up-to-date so that any security holes can be removed
distributed denial of service attacks (DDOS)
Use of numerous computers to launch a DOS
Acceptable Use Policy (AUP)
A policy that defines the actions users may perform while accessing systems and networking equipment.
Disaster Recovery Policy
A policy to minimise the impact of network failure - either through criminal actions or natural disasters.
A written policy detailing the frequency of backups and the location of the storage used.
A written policy detailing the process of reconstructing a system or switching over to other systems when a failure is detected.
A written policy detailing what data will be kept by an organisation and for how long after it is no longer being used.
Sets with similar terms
IS 3003 Chapter 8
MTA Security Fundamentals 98-367 Study Guide
Information Technology Chapter 9
Chapter 10 security
Other sets by this creator
1.2 Memory & storage
2.2 Programming Techniques
2.4 Computational Logic
1.2 Data Representation
You have been hired to develop a new marketing campaign for a business in your community. Your employer has asked you to determine based on the demographics of your community how to reach and influence the maximum number of community members. If you are successful, the business will draw in more customers and grater profits. For this task, you may select the type of business. Then you will develop an overview for a marketing campaign, which may consist of online, print, and other methods of reaching potential customers. In your overview, identify the methods you have chosen to use, and explain why these methods will be beneficial based on the demographics of our community and the customers your employer wishes to reach.
Complete the sentence using each term once. a. monogamy b. polyandry c. polygyny d. exogamy e. endogamy f. homogamy g. patrilineal h. blended family i. dual-employed marriage j. boomerang kids. The marriage of one man to two or more women at the same is called ________
Material tools of a culture, such as computers, change faster than nonmaterial tools, such as norms and values. This difference creates what has been called cultural lag. Computers have been around for some time. Still many Americans lag behind in their proficiency with the technology. Interview people you know of varying ages: someone under age twelve, some fellow teens, some young adults, and some elderly adults. Ask them how computer literate they are. Do they know how to use Windows? The internet? Does cultural lag exist in your sample? If so, try to find reasons or explanations for the lag.
large trucks can be ___________ times longer than passenger cars
Other Quizlet sets
Unit 3/ Lesson 3/4:
Quiz Week 7 - Chapters 12 & 13
Macro Econ Exam 2
YSL COMES UNDER FIRE WITH AD AUTHORITY FOR "DEGRADING" CAMPAIGN
A loose collection of information technologies and applications, plus the Web sites that use them.
% for living alone is the new norm:
Which authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification)?