Upgrade to remove ads
Chapter 11: Security and Ethics
Terms in this set (30)
the control of user access to a network or computer system
software that is designed to detect and recover from attacks by viruses and worms. It is usually part of a system protection software package.
the means by which a system verifies that the individual attempting to access the system is authorized to do so.
the process of making long-term archival file storage copies of files on the system.
a system threat that combines into one program the characteristics of other attacks, including a virus, a worm, Trojans, spyware, and other malicious code.
the science and technology of identifying authorized users based on their biological characteristics.
in cryptography, a method of transmitting data without encryption, in text that is readable by anyone who sees it.
the science of coding messages or text so unauthorized users cannot read them.
denial of service (DoS attack)
an attack on a network that makes the network unavailable to perform the functions it was designed to do. This can be done by flooding the server with meaningless requests or information.
the technique by which an intruder attempts to guess user passwords by trying words found in a dictionary.
translation of a message or data item from its original form to an encoded form, thus hiding its meaning and making it unintelligible without the key to decode it. It's used to improve system security and data protection.
the rules or standards of behavior that individuals are expected to follow demonstrating the principles of right and wrong.
a set of hardware and software that disguises the internal network address of a computer or network to control how clients from outside can access the organization's internal servers.
an MIT-developed authentication system that allows network managers to administer and manage user authentication at the network level.
a virus with a trigger, usually an event, that causes it to execute.
reviewing incoming and outgoing Internet packets to verify that the source address, destination address, and protocol are correct.
software that intercepts Internet data packets sent in cleartext and searches them for information, such as passwords.
a user access authentication method. Typically, it is a series of keystrokes that a user enters in order to be allowed to log on to a computer system.
a technique used to trick consumers into revealing personal information by appearing as a legitimate entity.
a sequence of strokes over a picture or graphic that is used to authenticate access to a computer system by an authorized user.
a tool that's used to decrypt a message that was encrypted using a public key.
a server positioned between an internal network and an external network or the Internet to screen all requests for information and prevent unauthorized access to network resources.
a tool that's used to encrypt a message, to be decoded later using a private key.
a technique whereby system intruders gain access to information about a legitimate user to learn active passwords, sometimes by calling the user and posing as a system technician.
the creation of false IP addresses in the headers of data packets sent over the Internet, sometimes with the intent of gaining access when it would not otherwise be granted.
a blended threat that covertly collects data about system users and sends it to a designated repository.
the capability of a system to fulfill its mission, in a timely manner, in the presence of attacks, failures, or accidents.
a malicious computer program with unintended side effects that are not intended by the user who executes the program.
a program that replicates itself by incorporating itself into other programs, including those in secondary storage, that are shared among other computer systems.
a computer program that replicates itself and is self-propagating in main memory.
YOU MIGHT ALSO LIKE...
Introduction to Business | Gaspar, Bierman, Kolari…
Chapter 5 MIS6
1.6 System Security
OTHER SETS BY THIS CREATOR
Chapter 12: Building a PC
Chapter 13: UNIX Operating System
Chapter 15: Linux Operating Systems
Chapter 12: System Management