Shared Flashcard Set

Details

cgs
cgs ch10
43
Computer Networking
Undergraduate 2
07/25/2014

Additional Computer Networking Flashcards

 


 

Cards

Term
computer security risk
Definition
is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
Term
cybercrime
Definition
is an online or Internet-based illegal act
Term
Symptoms of Infection
Definition
Files become corrupted
Available memory is less than expected
Screen displays unusual message or image
Music or unusual sound plays randomly
Existing programs and files disappear
Programs or files do not work properly
Unknown programs or files mysteriously appear
System properties change
Operating system does not start up
Operating system shuts down unexpectedly
Operating system runs much slower than usual
Term
Internet Attacks
denial of service attack (DoS attack)
Definition
disrupts computer access to Internet services
Term
Internet Attacks
DDoS
Definition
distributed denial of service
Term
Internet Attacks
botnet
Definition
is a group of compromised computers connected to a network
Term
Internet Attacks
back door
Definition
is a program or set of instructions in a program that allow users to bypass security controls
Term
Internet Attacks
Spoofing
Definition
is a technique intruders use to make their network or Internet transmission appear legitimate
Term
zombie
Definition
A compromised computer
Term
firewall
Definition
is hardware and/or software that protects a network’s resources from intrusion
Term
Intrusion detection software
Definition
Analyzes all network traffic
Assesses system vulnerabilities
Identifies any unauthorized intrusions
Notifies network administrators of suspicious behavior patterns or security breaches
SANS: Intrusion Detection FAQ: AINT Misbehaving: A Taxonomy of Anti-Intrusion Techniques
Term
Access controls
Definition
define who can access a computer, when they can access it, and what actions they can take
Term
Audit trails
Definition
log both successful and unsuccessful attempts
Term
Identification and authentication
Definition
a two-phase process:
identification: are you a valid user? (user name)
authentication: are you who you say you are?
passwords, CAPTCHAs, other enhanced access tools (see next slide)
Term
CAPTCHA
Definition
(“Completely Automated Public Turing test to tell Computers and Humans Apart”)
Term
possessed object
Definition
is any item that you must carry to gain access to a computer or computer facility (badges, smart cards, keys)
Often are used in combination with a PIN
Term
biometric device
Definition
authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
Term
Digital forensics
Definition
is the discovery, collection, and analysis of evidence found on computers and networks
Term
Information theft
Definition
occurs when someone steals personal or confidential information
Term
Safeguards
Definition
User Identification/authentication
Encryption
Term
Encryption
Definition
is a process of converting readable data into unreadable characters to prevent unauthorized access
Term
digital signature
Definition
is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender
Term
digital certificate
Definition
is a notice that guarantees a user or a Web site is legitimate
Term
digital certificate
Issued by a
Definition
certificate authority
Term
War driving
Definition
allows individuals to detect wireless networks while driving a vehicle through the area
Term
backup
Definition
is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
Term
Offsite backups are stored in a location separate from
Definition
computer site
Term
Two categories of backups:
Definition
Full backup
Selective backup
Three-generation backup policy
Term
The widespread use of computers has led to health concerns
Definition
Repetitive strain injury (RSI)
Tendonitis
Carpal tunnel syndrome (CTS)
Computer vision syndrome (CVS)
Computer addiction occurs when the computer consumes someone’s entire social life
Term
Computer ethics
Definition
are the moral guidelines that govern the use of computers and information systems
Information accuracy is a concern
Not all information on the Web is correct
Term
Intellectual property rights
Definition
are the rights to which creators are entitled for their work
Term
Information privacy
Definition
refers to the right of individuals and companies to deny or restrict the collection and use of information about them
Huge databases store data online
It is important to safeguard your information
Term
copyright
Definition
protects any tangible form of expression
Term
Digital rights management
Definition
(DRM) is a strategy designed to prevent illegal distribution of movies, music, and other digital content
Term
Common Points of Privacy Laws
Definition
Limit collected information to only what is necessary
Limit access to those who need it to perform their jobs
Outside release only with permission
Provide opportunity to verify correctness
Informed Consent: consent given before collection of personal information with knowledge of material facts needed to make a rational decision about providing the information
Opt-in: affirmative action required by consumer to allow collection/use
Opt-out: collection/use by default, consumer must take action to prevent
Term
cookie
Definition
is a small text file that a Web server stores on your computer
Term
Spam
Definition
is an unsolicited e-mail message or newsgroup posting
Term
Anti-spam programs
Definition
blocks e-mail messages from designated sources
Term
E-mail filtering
Definition
attempt to remove spam before it reaches your inbox
Term
Phishing
Definition
is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information
Term
Clickjacking
Definition
uses a clickable object on a Web site (button, image, link) which contains a malicious program (e.g. virus download, redirection to phony site)
Term
Social engineering
Definition
is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety
Term
Employee monitoring
Definition
involves the use of computers to observe, record, and review an employee’s use of a computer
Supporting users have an ad free experience!