Home
Browse
Create
Search
Log in
Sign up
Upgrade to remove ads
Only $2.99/month
V3
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Technology Skills terms
Terms in this set (20)
adware
Software that displays advertisements; you may see popups or a small window or bar that displays ads in your browser
back door
a means of accessing your computer that bypasses computer security mechanisms
bot
short for robot, a computer on which intruders have installed software that lets them secretly control the system form a remote location on the internet
Compromised computer
a computer that cannot be considered secure, because it has been infected with malware, been accessed by someone without the authority to access it, or been subject to some other form of malicious attack
configure
to choose options in order to create a custom system
Denial of Service (DOS)
an attack that successfully prevents or impairs the authorized functionality of networks, systems, or applications by exhausting resources
Drive-by Download
software downloaded by a malicious web site without your knowledge
Extended Validation Certificate (EV CERT)
A certificate that, prior to being issued, requires verification of a web sites's authenticity by a certificate authority
firmware
software that is embedded into hardware; it can be updated and accessed by the user
firewall
a security system that uses hardware and/or software mechanisms to prevent unauthorized users from accessing an organization's internal computer network
Instant Messagin (IM)
the ability to exchange short messages online with coworkers or others
key logger
software that records everything you type, then sends it off to whomever installed the software
peer-to-peer (P2P)
a network of computers that can directly access each other's files
phishing
the process of attempting to acquire sensitive information used for identity theft, such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an email or instant message, or via a website or telephone call
software patches
fixes to correct a problem
spyware
malware whose principal aim is to surreptitiously collect information by "spying" on the user
SSL (Secure Sockets Layer)
a method that uses data encryption and digital certificate authentication to secure information traveling over the internet
vulnerability
a weakness in a computer that allows an attacker to make unauthorized changes
worm
self-replication malware that can move from computer to computer on the network
Zombie
a computer that has compromised, often by a bonnet, so that an unauthorized person has complete control to use the computer to perform malicious tasks
YOU MIGHT ALSO LIKE...
Computer Skills v6
20 terms
CIS Sections 10.1,10.2, and 10.3
64 terms
IT Final
54 terms
online computer terminology
66 terms
OTHER SETS BY THIS CREATOR
Technology Exam Vocab.
110 terms
V10
25 terms
lord of the flies symbols
15 terms
V2
30 terms