Term
|
Definition
| Anytime a person accesses resournces in an unauthorized way. This may or may not be malicious. |
|
|
Term
|
Definition
| To go through soneone's trash in search of information. |
|
|
Term
|
Definition
| Using or manipulating pople inside the networking environment to gain access to that network from the outside. |
|
|
Term
|
Definition
| Form of infiiltration and social engineering that involves following someone else through a door as if you belong. |
|
|
Term
|
Definition
| Social engineering attack in which the attacker makes a phone call to someone in an organization to gain information. |
|
|
Term
|
Definition
| Act of trying to get people to give their usernames, passwords, or other security informaiton by pretending to be someone else electronically. |
|
|
Term
|
Definition
| Security concept using physical security, authentication, users and groups, and security policies. |
|
|
Term
|
Definition
| Any method a computer uses to determine who can access it. |
|
|
Term
|
Definition
| Hardware authentication invovling a credit-card sized card with ciruitry that can be used to identify the bearer of that card. |
|
|
Term
|
Definition
| Hardware device used to support authentication; works by scanning and remembering unique aspects of a user's various body parts by using some form of sensing device such a s a retinal scanner. |
|
|
Term
|
Definition
| User's combined permissions granted by multiple groups. |
|
|
Term
|
Definition
| Windows tool used to set local secruity policies on an individual system. |
|
|
Term
|
Definition
| Means of easily controlling the settings of multiple clients with policies such as setting minimum password length or preventing Registry edits. |
|
|
Term
|
Definition
| System of organizing data according to its sensitivity. |
|
|
Term
|
Definition
| Concept that members of an organization must abide by the rules of that organization. For a tech, its what software can and cannot be installed on an organizations computer. |
|
|
Term
|
Definition
| Utility made availale as an MMC snap-in that enables users to monitor various system evens, including network bandwidth usage and CPU utilization. |
|
|
Term
|
Definition
| Feature of Event Viewer's Security section that creates an entry in the Security Log when certain events happen. |
|
|
Term
|
Definition
| Feature of Event Viewer's Secruity that creates an entry in the Security Log wien certain objects are accessed such as a file or folder. |
|
|
Term
|
Definition
| The telling of certain events to a manager. Usually by pre-made forms. |
|
|
Term
|
Definition
| Consists of computer programs designed to break into computers or cause havoc on computers. |
|
|
Term
|
Definition
| Program that introduces into a user's computer experience without damaging any systems or data. |
|
|
Term
|
Definition
| Irritating browser windows that appears automatically when you visit a website. |
|
|
Term
|
Definition
| Grayware that runs in the background of a user's PC, sending information about browsing habits back to the company that installed it into the system. |
|
|
Term
|
Definition
| Type of malicious program that downloads ads to a user's computer, generating undesirable network traffic. |
|
|
Term
|
Definition
| Unsolicited emails from both legitimate businesses and scammers that accounts for a huge percentage of traffic on the internet. |
|
|
Term
|
Definition
| Program that can make a copy of itself without your necessarily being aware of it. |
|
|
Term
|
Definition
| Program that does something other than what the user who runs the program thinks it will do. |
|
|
Term
|
Definition
| Very special form of virus. Does not infect other files but repliates by making cop;ies of itself on other sytems on a network by taking advantage of security weaknessins in networking protocols. |
|
|
Term
|
Definition
| An addition to the operating system to patch a hole in the OS code. |
|
|
Term
|
Definition
| Keeping your patches up to date. |
|
|
Term
|
Definition
| Software designed to combat viruses by either seeking out and destroying them or passively guarding against them. |
|
|
Term
|
Definition
| Passive monitoring of a computer's activity, checking for viruses only when certain events occur. |
|
|
Term
|
Definition
| Code pattern of a known virus; used by antivirus software to detect viruses. |
|
|
Term
|
Definition
| Virus that attemps to change its signature to prevent detection by antivurs programs, usually by continaully scrambling a bit of useless code. |
|
|
Term
|
Definition
| A number generated by the software based on the contents of the file rather than the name, date, or size of that file. |
|
|
Term
|
Definition
| Virus that uses various methods to hide from antivirus software. |
|
|
Term
| Virus Definition or Data File |
|
Definition
| Files that enable the virus protection software to recognize the viruses on your system and clean them. These files should be updated often. |
|
|
Term
|
Definition
| Another name for the Core Antivirus Software Programming. |
|
|
Term
|
Definition
| Repairing damage caused by a virus. |
|
|
Term
|
Definition
| Device that restricts traffic between a local netgwork and the Internet. |
|
|
Term
|
Definition
| Making data unreadable to those who do not possess a key or password. |
|
|
Term
| Password Authentication Protocol (PAP) |
|
Definition
| Oldest and most basic form of authentication. |
|
|
Term
| Challenge Handshake Authentication Protocol (CHAP) |
|
Definition
| Common remote access protocol; serving system challenges the remote client, usually by means of asking for a password. |
|
|
Term
|
Definition
| Microsoft's variation of the CHAP protocol, which uses a slightly more advanced encryption protocol. Windows Vista uses MS-CHAP v2, and does not support MS-CHAP v. 1. |
|
|
Term
| Internet Protocol Secruity (IPSec) |
|
Definition
| Microsoft's encryption method of choice for networks consisting of multiple networks linked by a private connection, providing transparent encryption between the server and the client. |
|
|
Term
| Secure Socket Layer (SSL) |
|
Definition
| Security protocol used by a browser to crate secrue Web sites. |
|
|
Term
|
Definition
| Form in which a public key is sent from a Web server to a Web browser so that the browser can decrypt the data sent by the server. |
|
|