WebDes1&2: Cyber Security Safety
Terms in this set (48)
A citizen of cyberspace (i.e. the Internet). A netizen is any person using the Internet to participate in online social communities
is a generic term for a piece of malicious code. That is, programming code specifically developed to harm a computer or its data.
Viruses, Worms, Trojans, Bot armies, Keystroke loggers, Spyware, Adware, Scareware, Ransomware
Any flaw in the way a computer program is written or used that makes your computer vulnerable to attack. Security experts also call this a security vulnerability
A fix to a program to close a known security hole. Patches are routinely issued for operating systems (like Windows 7) and Internet browsers (like Internet Explorer and Firefox) as well as other software applications.
A piece of code that makes copies of itself. A virus sometimes also includes a destructive payload.
A unique pattern of bits that antivirus software uses to identify a virus.
A standalone malware program that copies itself across networks.
A low-talent hacker (often an immature teen) who uses easy, well-known techniques to exploit Internet security vulnerabilities. In the hacker community, being called a script kiddie is a major insult.
A mutated form of a virus or worm. Variants are usually just different enough that the original virus signature won't match.
Zero Day attack
An attack that takes advantage of a security hole for which there is no current patch.
A form of malware that includes more than just one attack. A blended threat could include a virus, a worm, a Trojan horse, and a DoS attack all in one attack.
Zombie or Bot
A computer that's been compromised by a piece of code that allows it to be controlled remotely without the computer owner's knowledge.
A denial of service attack. In a DoS attack, the victim is flooded with so much Internet traffic that legitimate users can't get through.
Using general knowledge of human behavior to trick users into breaking their own security rules.
Potentially Unwanted Programs. A politically correct term for unwanted adware and spyware.
Software programs that collect information about you and send that data on to a third party. Data grabbers include adware, spyware, and keyboard loggers.
A software program that monitors your computer usage without your knowledge.
A program that delivers targeted advertising content to users often by gathering information from a user's computer about what that person does online and which websites are visited.
End User Licensing Agreement. This is the detailed legalese document that you must agree to in order to install most programs.
A program that keeps track of every keystroke that you type at your computer.
The practice of advertising rogue security software on reputable websites to exploit users' trust of those sites.
A form of malware in which the user's computer files are encrypted or the system (or Internet connected cell device) is disabled if a ransom isn't paid.
A programmer who breaks into someone else's computer system or data without permission.
A hacker or malware writer who uses a virus, worm, or coordinated computer attack to commit an act of terrorism against a political adversary.
The process of collecting digital evidence needed to identify and convict computer criminals.
A unique address that identifies where a computer is connected to the Internet. Every computer, even yours if you're using broadband access, has an Internet protocol (IP) address.
The use of biological data, like fingerprints or retinal scans, for identification
A collection of tools that allows a hacker to gain full access to a vulnerable computer and hide his or her tracks.
Unsolicited email messages, also called electronic junk mail.
(Simple Mail Transfer Protocol) The Internet rules used to send and create email messages.
A con artist scam to trick people into giving out personal and financial information.
A hidden image that spammers use to verify that you're actually reading the SPAM they sent you. (Also called a web beacon or transparent GIF.)
A type of web crawler program that searches the Internet and collects (harvests) all the email addresses it finds posted on web pages.
A form of intimidation and harassment using electronic means such as email, text messages, chat rooms, and social networking sites.
Uniform Resource Locator. The URL is the word-like address used to locate a
specific web page on the Internet.
Information written to your hard drive by a website that you visit. A website can use a cookie to recognize you, and sometimes remember custom settings, when you visit that site again in the future.
A cookie placed on your machine from a website you DIDN'T actually visit.
Someone who "farms" the Internet, growing collections (databases) of information about Internet users.
A web-based log containing text entries ordered by date (like a journal) as well as links to other sites.
Social networking site
A website that allows users to define relationships between themselves and network among not just their own friends, but friends of friends, and friends of friends' friends—ever expanding their online network.
Hitting Poke in Facebook lets another user know you'd like to get her attention. She can poke you back, write on your wall, or even ask to Friend you.
A predator who uses the Internet (via chat rooms, IM, or email) to harass his victim.
A piece of software that controls the type of traffic that is allowed to pass between networks.
The physical device that routes information between devices within a network.
Someone who connects to an unsecured wireless connection that really belongs to someone else.
A computer network that uses radio waves to send and receive data.
Sending nude, semi-nude, or sexually explicit photos via text message or over the Internet.
YOU MIGHT ALSO LIKE...
Test Preparation TOEIC, SAT, TOEFL
OTHER SETS BY THIS CREATOR
$ Mgmt2: Chpt 14 Insurances
$Mgmt 2: Final Exam Review
Entrep: Chpt 7: Market Research Identify a Need
Mgmt 2: Cost of Credit -Credit Cards
THIS SET IS OFTEN IN FOLDERS WITH...
FBLA Cyber Security
Cyber Security Vocabulary
Web 1-2: Internet Safety Cyber Security
Unit Vocabulary- Ethical, Legal Issues & Cyber Security