Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
13 Cards in this Set
- Front
- Back
War Dialing
|
Computer automatically dials phone numbers looking for modems.
|
|
Denial-of-Service Attack
|
Constant stream of requests made to a Web-server (usually via a Botnet) that overwhelms and shuts down service.
|
|
Dictionary Attack
|
Spammers use special software to guess addresses at a company and send blank e-mail messages. Messages not returned usually have valid e-mail addresses and are added to spammer e-mail lists.
|
|
Data Diddling
|
Making changes to data before, during, or after it is entered into a system.
|
|
Zero-day attack
|
An attack between the time a new software vulnerability is discovered and the time a software developer releases a patch that fixes the problem.
|
|
Social Engineering
|
Techniques, usually psychological tricks, to gain access to sensitive data or information. Used to gain access to secure systems or locations.
|
|
Virus
|
A segment of executable code that attaches itself to an application program or some other executable system component. When the hidden program is triggered, it makes unauthorized alterations to the way a system operates.
|
|
Worm
|
Similar to a virus, except that it is a program rather than a code segment hidden in a host program. A worm also copies itself automatically and actively transmits itself directly to other systems.
|
|
Identity Theft
|
Assuming someone else's identity.
|
|
Posing
|
Using a fake business to acquire sensitive information.
|
|
Piggybacking
|
When a perpetrator latches onto a user who is logging in to a system. The legitimate user unknowingly carries the perpetrator with him into the system.
|
|
Malware
|
Any software which can be used to do harm.
|
|
Data Leakage
|
Unauthorized copying of company data.
|