Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
19 Cards in this Set
- Front
- Back
social engineering
|
using one's social skills to get computer users to provide you with information to access an information system or its data
|
|
dumpster diving
|
going through the trash cans of an organization to find secret or confidential information, including information needed to access an information system and/or its data
|
|
cyberterrorist
|
someone who intimidates or coerces a government or organization to advance his political or social objectives by launching computer based attacks against computers
|
|
hackers
|
a person who enjoys computer technology and spends time learning and using computer systems
|
|
criminal hacker (cracker)
|
a computer-savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords, corrupt files and programs, or even transfer money
|
|
script bunny
|
a cracker with little technical savvy who downloads programs called scripts, which automate the job of breaking into computers
|
|
insider
|
an employee, disgruntled or otherwise, working solo or in concert with outsiders to compromise corporate systems
|
|
virus
|
a computer program file capable of attaching to disks or other files and replicating itself repeatedly, typically without the users knowledge or permission
|
|
worm
|
a parasitic computer program that can create copies of itself on the infected computer or send copies to other computers via a network
|
|
trojan horse
|
a malicious program that disguises itself as a useful application and purposefully does something the user does not expect
|
|
anti virus program
|
software that runs in the background to protect your computer from dangers lurking on the internet and other possible sources of infected files
|
|
password sniffer
|
a small program hidden in a network or a computer system that records identification numbers and passwords
|
|
software piracy
|
the act of illegally duplicating software
|
|
public - key infrastructure
|
a means to enable users of an unsecured public network such as the internet to securely and privately exchange data through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority
|
|
biometrics
|
the measurement of one of a person's traits, whether physical or behavioral
|
|
intrusion detection system
|
software that monitors system and network resources and notifies network security personnel when it senses a possible intrusion
|
|
platform for privacy preferences
|
a screening technology that shields users from web sites that dont provide the level of privacy protection they desire
|
|
ergonomics
|
the science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them
|
|
code of ethics
|
a code that states the principles and core values that are essential to a set of people and, therefor, govern their behavior
|