Home
Subjects
Textbook solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
1.6 System Security
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (32)
malware
The overall term for all types of 'malicious software'.
viruses
Malicious software that attaches itself to programs or files on a computer or server. It can causes documents/programs to be corrupted or deleted.
worms
Malicious software that copies itself in order to spread to other computers. Unlike a virus, it does not need to attach to a program.
Trojan horse
Malicious software that is designed to access a computer by misleading users of its intent.
social engineering
People are the 'weak point' in computer systems. Criminals use our weaknesses as a way of spreading viruses or stealing information.
phishing
Emails sent pretending to be from genuine companies trying to steal data.
brute force attacks
A trial and error method used for gaining access to password based entry systems.
denial of service attacks (DOS)
When a website is overloaded with unwanted traffic from a single source trying to stop the website from working..
data interception and theft
Data travels across networks in packets. Packets can be intercepted
If packets are encrypted, they cannot be read without a key.
SQL injection
Where an attacker uses SQL wildcards on website user input boxes to try to gain access to the databases behind the website.
network forensics
Involves the examination of data sent across a network. Looking for unusual patterns or times of high network traffic.
packet sniffing
Inspecting information packets as they travel around networks
penetration testing
Professional hacking to identify and repair network vulnerabilities.
anti-malware software
Software with the aim of preventing malware from entering the system.
firewall
Part of a computer system that is designed to block unauthorized access from outside the network
network policies
A set of policies that govern how a network is managed and used.
user access levels
Controls what files or areas of the network different groups of users can access.
passwords
Typically a string of characters used to gain access to a service or system.
biometrics passwords
Can be used in addition to 'standard' password entry e.g. retina scan, fingerprint, voice, facial recognition.
strong passwords
A password that contains a specific amount of characters with mixed cases and often requires letters and numbers.
encryption
Process of converting readable data into unreadable characters to prevent unauthorised access.
spyware
A type of Malware that locates and saves data from users without them knowing about it.
adware
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
captcha
A test created by software developers that the visitor must pass before continuing to register or enter a website; designed to thwart software bots.
Two factor authentication
Validating user identity with two means of identification - usually a password and a code sent to a smartphone.
automatic software updates
A method of keeping software up-to-date so that any security holes can be removed
distributed denial of service attacks (DDOS)
Use of numerous computers to launch a DOS
Acceptable Use Policy (AUP)
A policy that defines the actions users may perform while accessing systems and networking equipment.
Disaster Recovery Policy
A policy to minimise the impact of network failure - either through criminal actions or natural disasters.
Backup Policy
A written policy detailing the frequency of backups and the location of the storage used.
Failover Policy
A written policy detailing the process of reconstructing a system or switching over to other systems when a failure is detected.
Archive Policy
A written policy detailing what data will be kept by an organisation and for how long after it is no longer being used.
Sets with similar terms
IS 3003 Chapter 8
30 terms
MTA Security Fundamentals 98-367 Study Guide
129 terms
Information Technology Chapter 9
31 terms
Chapter 10 security
76 terms
Other sets by this creator
1.2 Memory & storage
117 terms
2.2 Programming Techniques
52 terms
2.4 Computational Logic
20 terms
1.2 Data Representation
91 terms
Verified questions
SOCIOLOGY
You have been hired to develop a new marketing campaign for a business in your community. Your employer has asked you to determine based on the demographics of your community how to reach and influence the maximum number of community members. If you are successful, the business will draw in more customers and grater profits. For this task, you may select the type of business. Then you will develop an overview for a marketing campaign, which may consist of online, print, and other methods of reaching potential customers. In your overview, identify the methods you have chosen to use, and explain why these methods will be beneficial based on the demographics of our community and the customers your employer wishes to reach.
SOCIOLOGY
Complete the sentence using each term once. a. monogamy b. polyandry c. polygyny d. exogamy e. endogamy f. homogamy g. patrilineal h. blended family i. dual-employed marriage j. boomerang kids. The marriage of one man to two or more women at the same is called ________
SOCIOLOGY
Material tools of a culture, such as computers, change faster than nonmaterial tools, such as norms and values. This difference creates what has been called cultural lag. Computers have been around for some time. Still many Americans lag behind in their proficiency with the technology. Interview people you know of varying ages: someone under age twelve, some fellow teens, some young adults, and some elderly adults. Ask them how computer literate they are. Do they know how to use Windows? The internet? Does cultural lag exist in your sample? If so, try to find reasons or explanations for the lag.
SOCIOLOGY
large trucks can be ___________ times longer than passenger cars
Other Quizlet sets
Unit 3/ Lesson 3/4:
13 terms
Quiz Week 7 - Chapters 12 & 13
30 terms
Macro Econ Exam 2
52 terms
Psychology Midterm
83 terms
Related questions
QUESTION
YSL COMES UNDER FIRE WITH AD AUTHORITY FOR "DEGRADING" CAMPAIGN
QUESTION
A loose collection of information technologies and applications, plus the Web sites that use them.
QUESTION
% for living alone is the new norm:
QUESTION
Which authentication requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification)?