Ch. 9 Network & Internet Security
Terms in this set (37)
Software used to detect and eliminate computer viruses and other types of malware.
Biometric access system
An access control system that uses one unique physical characteristic of an individual (such as a fingerprint, face, or voice) to authenticate that individual.
A computer that is controlled by a hacker or other computer criminal.
A group of bots that are controlled by one individual.
Any illegal act involving a computer.
An act of malicious destruction to a computer or computer resource.
A software program installed without the user's knowledge and designed to alter the way a computer operates or to cause harm to the computer system.
A malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers.
Children or teenagers bullying other children or teenagers via the Internet.
Repeated threats or harassing behavior between adults carried out via e-mail or another Internet communications method.
Denial of service (DoS) attack
An act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function.
A group of electronic data that can be used to verify the identity of a person or organization; includes a key pair that can be used for encryption and digital signatures.
A unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been changed since it was signed.
A fraud or scam carried out through the Internet.
A method of scrambling the contents of an e-mail message or a file to make it unreadable if an unauthorized user intercepts it.
A collection of hardware and/or software intended to protect a computer or computer network from unauthorized access.
Using a computer to break into another computer system.
Using someone else's identity to purchase goods or services, obtain new credit cards or bank loans, or otherwise illegally masquerade as that individual.
Any type of malicious software.
Online auction fraud
When an item purchased through an online auction is never delivered after payment, or the item is not as specified by the seller.
A secret combination of characters used to gain access to a computer, computer network, or other resource.
The use of spoofed domain names to obtain personal information to be used in fraudulent activities.
The use of spoofed e-mail messages to gain credit card numbers and other personal data to be used for fraudulent purposes.
Possessed knowledge access system
An access control system that uses information only the individual should know to identify that individual.
Possessed object access system
An access control system that uses a physical object an individual has in his or her possession to identify that individual.
Private key encryption
A type of encryption that uses a single key to encrypt and decrypt the file or message.
Public key encryption
A type of encryption that uses key pairs to encrypt and decrypt the file or message.
Secure Web page
A Web page that uses encryption to protect information transmitted via that Web page.
Software, typically a suite of programs, used to protect your computer against a variety of threats.
A personalized phishing scheme targeted at an individual.
A malicious program that masquerades as something else.
Using two different methods to authenticate a user.
Gaining access to a computer, network, file, or other resource without permission.
Using a computer resource for unapproved activities.
Virtual private network (VPN)
A private, secure path over the Internet that provides authorized users a secure means of accessing a private network via the Internet.
Driving around an area with a Wi-Fi-enabled computer or mobile device to find a Wi-Fi network to access and use without authorization.
Accessing an unsecured Wi-Fi network from your current location without authorization.
YOU MIGHT ALSO LIKE...
Network and Internet Security-Ch 9
CMPTR Ch 6
IS 52 Chapter 9 Review
Chapter 6 Info Tech
OTHER SETS BY THIS CREATOR
Introduction to Accounting
College Accounting Ch.1 Book Order
CISB Computer Network Ch. 16
THIS SET IS OFTEN IN FOLDERS WITH...
Computer Concepts Chap #14
Microcomp Test 1