How can we help?

You can also find more resources in our Help Center.

Study sets matching "term:spoofing = a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network"

Study sets
Classes
Users

Study sets matching "term:spoofing = a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network"

11 terms
Chap 6: Internet and Network attacks
Malware
Virus
Worm
Trojan Horse
- Malicious software... - Works in the background... - Alters opera…
Smallsoftware.... Self replicating.... Encrypted and morphing
Repeated replication to overload resources.
Hides within or looks like a legitimate software.
Malware
- Malicious software... - Works in the background... - Alters opera…
Virus
Smallsoftware.... Self replicating.... Encrypted and morphing
cs chap 5
digital security risk
computer crime
cyber crime
botnet
any event or action that could cause a loss of or damage to a…
any illegal act involving the use of a computer of related de…
an online or internet based illegal act
is a group of compromised computers or mobile devices connect…
digital security risk
any event or action that could cause a loss of or damage to a…
computer crime
any illegal act involving the use of a computer of related de…
12 terms
MIS exam 2
Digital Security Risk
Cyber Crime
Hacker
Cracker
any event or action that could cause a loss of or damage to a…
an online or internet based illegal act
...
...
Digital Security Risk
any event or action that could cause a loss of or damage to a…
Cyber Crime
an online or internet based illegal act
8 terms
Carrer Prep
identity theft
authentication
spy ware
spoofing
Identity theft is a crime where a criminal steals some of you…
A method for confirming users' identities
a bad sideffect of free down loads with spyware some one can…
A technique intruders use to make their network or internet t…
identity theft
Identity theft is a crime where a criminal steals some of you…
authentication
A method for confirming users' identities
53 terms
MICRO APPLICATIONS
digital security risk
cyber crime
hacker
cracker(script kiddie)
any event or action that could cause a loss of or damage to c…
online or Internet-based illegal acts such as distributing ma…
someone who accesses a computer or network illegally
someone who accesses a computer or network illegally but has…
digital security risk
any event or action that could cause a loss of or damage to c…
cyber crime
online or Internet-based illegal acts such as distributing ma…
10 terms
matching Chapter 5
1. digital security risk
2. bot
3. zombie
4. denial of service attack
H- any event or action that could cause a loss of or damage t…
C- program that performs a repetitive task on a network
A- compromised computer or device whose owner is unaware the…
G- as assault whose purpose is to disrupt computer access to…
1. digital security risk
H- any event or action that could cause a loss of or damage t…
2. bot
C- program that performs a repetitive task on a network
19 terms
IT 100
Types of Security Risks
Internet Attacks
Network Attacks
Malware
-Internet and Network Attacks... -Unauthorized access and use... -S…
Computer Virus, Worm, Trojan Horse, Rootkit, Spyware, Adware
Botnets, Dos attacks, DDos attacks, Back doors, Spoofing
Software that is intended to damage or disable computers and…
Types of Security Risks
-Internet and Network Attacks... -Unauthorized access and use... -S…
Internet Attacks
Computer Virus, Worm, Trojan Horse, Rootkit, Spyware, Adware
68 terms
chapter 5 cgs2060
Digital security risk
Cybercrime
hacker
cracker
any event or action that could cause a loss of or damage to c…
referes to online or internet based illegals actions such as…
although originally a complimentary word for a computer enthu…
someone who accesses a computer or network illegally but has…
Digital security risk
any event or action that could cause a loss of or damage to c…
Cybercrime
referes to online or internet based illegals actions such as…
12 terms
MIS 161 -- Digital Safety and Security
Spyware
Adware
Digital Security risk
Computer crime
A program placed on a computer or mobile device without the u…
A program that displays an online advertisement in a banner o…
any event or action that could cause a loss of or damage to a…
Any illegal act involving the use of a computer or related de…
Spyware
A program placed on a computer or mobile device without the u…
Adware
A program that displays an online advertisement in a banner o…
15 terms
Comp. Chapter 5
digital security risk
bot
in which particularly devastating type…
spoofing
is any event or action that could cause a loss of or damage t…
program that performs a repetitive task on a network.
distributed DoS attack
technique intruders use to make their network or Internet tra…
digital security risk
is any event or action that could cause a loss of or damage t…
bot
program that performs a repetitive task on a network.
19 terms
IT 100
Types of Security Risks
Internet Attacks
Network Attacks
Malware
-Internet and Network Attacks... -Unauthorized access and use... -S…
Computer Virus, Worm, Trojan Horse, Rootkit, Spyware, Adware
Botnets, Dos attacks, DDos attacks, Back doors, Spoofing
Software that is intended to damage or disable computers and…
Types of Security Risks
-Internet and Network Attacks... -Unauthorized access and use... -S…
Internet Attacks
Computer Virus, Worm, Trojan Horse, Rootkit, Spyware, Adware
118 terms
Chapter 5 Computer Tech
Digital Security Risk
Computer Crime
Cybercrime
crimeware
any event or action that could cause a loss of or damage to c…
An illegal act using a computer or related device
online or internet based illegal acts such distributing malwa…
software used by cybercriminals
Digital Security Risk
any event or action that could cause a loss of or damage to c…
Computer Crime
An illegal act using a computer or related device
10 terms
Chapter 5 Business computers 225
Script kiddie
Zombie
Bot
Spoofing
Hacker who does not have the technical skills and knowledge o…
Compromise the computer or device to owner is unaware the com…
Program that performs a repetitive task on a network
Technique Intruder uses to make their Network or Internet tra…
Script kiddie
Hacker who does not have the technical skills and knowledge o…
Zombie
Compromise the computer or device to owner is unaware the com…
24 terms
CS 130 Chapter 5 Review
Digital security risk
Computer crime
Cybercrime
Malware
any event or action that could cause a loss of or damage to c…
any illegal act involving the use of a comptuer or related de…
online or Internet-based illegal acts such as distributing ma…
programs that act without a user's knowledge and deliberately…
Digital security risk
any event or action that could cause a loss of or damage to c…
Computer crime
any illegal act involving the use of a comptuer or related de…
97 terms
CSIC Module 5
Digital Security Risks
Computer Crime
Cybercrime
Hacker
Any event or action that could cause loss of or damage to com…
Illegal act involving use of computer or other related devices
Online or Internet based illegal acts such as distributing ma…
Someone who accesses computer or network illegally
Digital Security Risks
Any event or action that could cause loss of or damage to com…
Computer Crime
Illegal act involving use of computer or other related devices
93 terms
Chapter 5
digital security risk
computer crime
cybercrime
crimeware
any event or action that could cause a loss of or damage to c…
any illegal act involving the use of a computer or related de…
online or internet based illegal acts such as distributing ma…
software used by cybercriminals
digital security risk
any event or action that could cause a loss of or damage to c…
computer crime
any illegal act involving the use of a computer or related de…
15 terms
Security
back door
denial of service attack (DoS attack)
spoofing
encryption algorithm (cypher)
a program or set of instructions in a program that allows use…
an assault whose purpose is to disrupt computer access to an…
a technique intruders use to make their network or internet t…
a set of steps that can convert readable plaintext into unrea…
back door
a program or set of instructions in a program that allows use…
denial of service attack (DoS attack)
an assault whose purpose is to disrupt computer access to an…
99 terms
MIS Chapter 5
Digital security risk
Computer crime
Cyber crime
Crime ware
Event or action that could cause a loss or damage to computer…
Any illegal act involving the use of a computer or related de…
Online or Internet based illegal acts such as distributing ma…
Software used by cybercriminals
Digital security risk
Event or action that could cause a loss or damage to computer…
Computer crime
Any illegal act involving the use of a computer or related de…
17 terms
Computer Chapter 5
IP Address
URL (Uniform Resource Locator)
domain Name
digital security risk
Short for Internet Protocol address, is a sequence of numbers…
A Brower retrieves a webpage using its own address
I a text-based name that corresponds to the IP address of a s…
Is any event or action that could cause a loss of or damage t…
IP Address
Short for Internet Protocol address, is a sequence of numbers…
URL (Uniform Resource Locator)
A Brower retrieves a webpage using its own address
27 terms
Cyber Security (Ch.11)
hacker
cyberbullying
malware
cyber crime
...
...
...
an online or internet based illegal act
hacker
...
cyberbullying
...
24 terms
Cyber Security Key Terms
Types of Cyber Crimes
Computer security risk
Cyber Crime
Computer Virus
Hacker... Crackers... Script Kiddies... Corporate Spies... Unethical... Cybe…
Any event or action that could cause a loss or damage to comp…
An online or internet-based illegal act
Affects a computer negatively by altering the way the compute…
Types of Cyber Crimes
Hacker... Crackers... Script Kiddies... Corporate Spies... Unethical... Cybe…
Computer security risk
Any event or action that could cause a loss or damage to comp…
116 terms
Intro to Computers Ch5
Digital security risk
computer crime
cybercrime
crimeware
any event or action that could cause a loss of or damage to c…
any illegal act involving the use of a computer or related de…
online or Internet based illegal acts
software used by cybercriminals
Digital security risk
any event or action that could cause a loss of or damage to c…
computer crime
any illegal act involving the use of a computer or related de…
108 terms
Chapter 5
Digital security risks
Computer crime
Cybercrime
Crimeware
any event or action that could cause a loss of or damage to c…
any illegal act involving the use of a computer or related de…
refers to online or Internet-based illegal acts such as distr…
software used by criminals
Digital security risks
any event or action that could cause a loss of or damage to c…
Computer crime
any illegal act involving the use of a computer or related de…
16 terms
Chapter Five
cybercrime
virus
worm
antivirus software
online or internet based illegal acts such as distributing ma…
a potentially damaging computer program that infects or effec…
malware that resides in active memory and replicates itself o…
software that protects a computer against viruses by identify…
cybercrime
online or internet based illegal acts such as distributing ma…
virus
a potentially damaging computer program that infects or effec…
85 terms
Chapter 5 - Digital Safety and Security Identifying Threats, Issues, and Defenses
digital security risk
cybercrime
hacker
cracker
as any event or action that could cause a loss of or damage t…
refers to online or Internet-based illegal acts such as distr…
complimentary word for a computer enthusiasts, now has a dero…
someone who access a computer or network illegally but has th…
digital security risk
as any event or action that could cause a loss of or damage t…
cybercrime
refers to online or Internet-based illegal acts such as distr…
Chapter 5 Computers
Digital security risk
computer crime
cybercrime
crimeware
any event or action that could cause a loss of or damage to c…
any illegal act involving the use of a computer or related de…
refers to online or internet-based illegal acts such as distr…
software sometimes used by cybercriminals
Digital security risk
any event or action that could cause a loss of or damage to c…
computer crime
any illegal act involving the use of a computer or related de…
115 terms
Computing for Behavioral Sciences Ch. 5
digital security risk
computer crime
cyber crime
hacker
event or action that could cause a loss of or damage to compu…
any illegal act involving the use of a computer or related de…
refers to online or internet-based illegal acts such as distr…
someone who accesses a computer or network illegally
digital security risk
event or action that could cause a loss of or damage to compu…
computer crime
any illegal act involving the use of a computer or related de…
57 terms
Chapter 5 Computers
Digital Security Risk
Cybercrime
crimeware
Hacker
action that could cause loss/damage to computer software
illegal online acts
software used by cybercriminals
person who accesses computer or network illegally
Digital Security Risk
action that could cause loss/damage to computer software
Cybercrime
illegal online acts
18 terms
SPS - Internet Security
Botnet
Cookie
Firewall
Malware
A group of zombie computers that are under the control of an…
a short line of text that a web site puts on your computer's…
blocks traffic into and out of a private network or users com…
software designed to infiltrate or damage a computer system.
Botnet
A group of zombie computers that are under the control of an…
Cookie
a short line of text that a web site puts on your computer's…
129 terms
CIS 111 Chapter 5&6
Digital security risk
Computer Crime
Cybercrime
Hacker
any event or action that could cause a loss of or damage to c…
Any illegal act involving the use of a computer or related de…
to online or Internet-based illegal acts such as... distributing…
someone who accesses a computer or network illegally
Digital security risk
any event or action that could cause a loss of or damage to c…
Computer Crime
Any illegal act involving the use of a computer or related de…
17 terms
Ethics
Hacker
Cracker
Computer Security Risk
Cybercrime
This is someone that seeks to understand computer strictly fo…
This is the common term used to describe a malicious hacker
is any event or action that could cause a loss of or damage t…
is an online or Internet-based illegal act
Hacker
This is someone that seeks to understand computer strictly fo…
Cracker
This is the common term used to describe a malicious hacker
55 terms
Computers Chapter 5
Digital Security Risk
Computer Crime
Cybercrome
Hacker
any event or action that could cause a loss of or damage to c…
any illegal act involving the use of a computer or related de…
refers to online or Internet-based illegal acts such as distr…
originally a complementary word for a computer enthusiast, no…
Digital Security Risk
any event or action that could cause a loss of or damage to c…
Computer Crime
any illegal act involving the use of a computer or related de…
120 terms
Chapter 5: Digital Security
digital security risk
Cybercrime
computer crime
crimeware
any action or event that could cause a loss of or damage to c…
online or internet based illegal acts such as distributing ma…
any illegal act involving use of computer or related devices
software used by cybercriminals
digital security risk
any action or event that could cause a loss of or damage to c…
Cybercrime
online or internet based illegal acts such as distributing ma…
82 terms
MISS2223 Flashcards
Digital Security Risk
Computer Crime
Cybercrime
Cyberware
Any event or action that could cause a loss of or damage to a…
Any illegal act involving the use of a computer or related de…
Online or Internet-based illegal acts such as distributing ma…
Software used by cybercriminals.
Digital Security Risk
Any event or action that could cause a loss of or damage to a…
Computer Crime
Any illegal act involving the use of a computer or related de…
72 terms
csc100 ch 11
any event or action that could cause a…
any illegal act involving a computer g…
online or internet-based illegal acts
software used by cybercriminals is
computer security risk
computer crime
cybercrime
crimeware
any event or action that could cause a…
computer security risk
any illegal act involving a computer g…
computer crime
67 terms
Chapter 5: Digital Safety and Security
Digital Security Risk
Computer Crime
Cybercrime
Crimeware
Any event or action that could cause a loss of or damage to c…
Any illegal act involving the use of a computer or related de…
refers to online or Internet-based illegal acts such as distr…
Software used by cybercriminals
Digital Security Risk
Any event or action that could cause a loss of or damage to c…
Computer Crime
Any illegal act involving the use of a computer or related de…
20 terms
Ethics Terms
integrity
plagiarism
honesty
punctuality
Honesty, high moral standards; an unimpaired condition, compl…
a piece of writing that has been copied from someone else and…
A character trait of a person who is open and truthful in dea…
being on time for work
integrity
Honesty, high moral standards; an unimpaired condition, compl…
plagiarism
a piece of writing that has been copied from someone else and…
29 terms
Micro 5
Cybercrime
digital security risk
hacker
cracker
Online or Internet-based illegal acts such as distributing ma…
any event or action that could cause a loss of or damage to c…
someone who accesses a computer or network illegally
someone who accesses a computer or network illegally but has…
Cybercrime
Online or Internet-based illegal acts such as distributing ma…
digital security risk
any event or action that could cause a loss of or damage to c…
29 terms
Ch 5 COSC 111
digital security risk
computer crime
cybercrime
Malware
any event or action that could cause a loss of or damage to a…
Any illegal act involving the use of a computer or related de…
online or Internet-based illegal act
consists of programs that act without a user's knowledge and…
digital security risk
any event or action that could cause a loss of or damage to a…
computer crime
Any illegal act involving the use of a computer or related de…
80 terms
Computers Chapter 5
crimeware
hacker
cracker
script kiddie
software used by cybercriminals
accesses a computer or network illegally
accesses a computer/network illegally with the intent to dest…
same intent as cracker but not the same technology skills so…
crimeware
software used by cybercriminals
hacker
accesses a computer or network illegally
30 terms
Network Administrator
Router
DSL
Network Hub
Network Switch
Device that forwards data on a network
(Digital Subscriber Line) A high-speed Internet connection th…
a device that connects multiple computers into a network.
Connects multiple network segments up to the speed the hardwa…
Router
Device that forwards data on a network
DSL
(Digital Subscriber Line) A high-speed Internet connection th…
15 terms
10.1 Security, Safety, and Ethics
possessed object
biometric device
PIN
Root access
is any item that you must carry to gain access to a computer…
authenticates a person's identity by translating a personal c…
a personal identification number
is the same as administrator access
possessed object
is any item that you must carry to gain access to a computer…
biometric device
authenticates a person's identity by translating a personal c…
95 terms
MIS chapter 5
digital security risk
computer crime
cybercrime
crimeware
any event or action that could cause a loss of or damage to c…
any illegal act involving the use of a computer or related de…
refers to online or Internet-based illegal acts such as distr…
software used by cybercriminals
digital security risk
any event or action that could cause a loss of or damage to c…
computer crime
any illegal act involving the use of a computer or related de…
15 terms
10.1 Security, Safety, and Ethics Ordered
possessed object
biometric device
PIN
Root access
is any item that you must carry to gain access to a computer…
authenticates a person's identity by translating a personal c…
a personal identification number
is the same as administrator access
possessed object
is any item that you must carry to gain access to a computer…
biometric device
authenticates a person's identity by translating a personal c…
32 terms
Security & privacy
computer security risk
Common types of security risks
I have anti-virus software so my PC wo…
anti-virus software protects against s…
any event or action that causes loss of or damage to a comput…
malware, phishing, info theft, spoofing, network attacks, hac…
Myth 1
myth 2
computer security risk
any event or action that causes loss of or damage to a comput…
Common types of security risks
malware, phishing, info theft, spoofing, network attacks, hac…
15 terms
CIS 111 - Chapter 5 Study Guide
Backup
Biometric device
Computer ethics
Cyberextortionist
A duplicate of a file, program, or media that can be used if…
Authenticates a person's identity by translating a personal c…
The moral guidelines that govern the use of computers, mobile…
Someone who demands payment to stop an attack on an organizat…
Backup
A duplicate of a file, program, or media that can be used if…
Biometric device
Authenticates a person's identity by translating a personal c…
26 terms
Chapter 2 Introduction to Computer Information Systems
arpanet
avi
bit
byte
short for advanced research projects agency, agency of the u.…
audio video interleaved
short for binary digit, the smallest unit of data the compute…
when 8 bits are grouped together as a unit
arpanet
short for advanced research projects agency, agency of the u.…
avi
audio video interleaved
23 terms
computer chapter 11
antivirus program
CAPTCHA
computer crime
computer security risk
program that protects a computer against viruses by identifyi…
program used by some Web sites to provide further protection…
any illegal act involving a computer
any event or action that could cause a loss or damage to comp…
antivirus program
program that protects a computer against viruses by identifyi…
CAPTCHA
program used by some Web sites to provide further protection…
15 terms
Chapter 5
Digital security risk
Computer crime
Cybercrime
Malware
Any event or action that could cause a loss of or damage to a…
Any illegal act involving the use of a computer or related de…
An online or Internet based illegal act
Consists of programs that act without a users knowledge and d…
Digital security risk
Any event or action that could cause a loss of or damage to a…
Computer crime
Any illegal act involving the use of a computer or related de…
107 terms
MIS Test 2
digital security risk
computer crime
cybercrime
crimeware
any event or action that could cause a loss of or damage to c…
any illegal act involving the use of a computer
online or internet based illegal acts such as distributing ma…
software used by cybercriminals
digital security risk
any event or action that could cause a loss of or damage to c…
computer crime
any illegal act involving the use of a computer
1 of 10