Shared Flashcard Set

Details

MIS 4153 -FINAL CHAPTER 10
Vocabulary
38
Management
Undergraduate 4
12/07/2009

Additional Management Flashcards

 


 

Cards

Term
Active Content
Definition
Programs that are embedded transparently in Web Pages that cause action to occur.
Term
ActiveX
Definition
An object, or control, that contains programs and properties that are put in Web Pages to perform particular tasks.
Term
Applet
Definition
A program that execute within another program; it cannot execut directly on a computer.
Term
Certification Authority (CA)
Definition
A company that issues digital certificates to organziations or individuals.
Term
Computer Forensics
Definition
The field responsible for the collection, preservation, and analusis of computer-related evidence.
Term
Countermeasure
Definition
a physcial or logical procedure that recognizes, reduces, or eliminates a threat.
Term
Cryptography
Definition
The science that studies encrpytionm which is the hiding of messages so that only the sender and reciever can read them.
Term
Cybervandalism
Definition
The electronic defacing of an existing web site page.
Term
Decrypt
Definition
Information that has been decoded. The oppostie of encrypt.
Term
Digital Cerfiticate (Digital ID)
Definition
an attachment to an email message or data embedded in a web page that verifies the identity of a sender or website.
Term
Digital Signature
Definition
An encryption message digest.
Term
Domain Name Server
Definition
A computer on the Internet that maintains directories that link domain names to IP Addresses.
Term
Eavesdropper
Definition
A person or device who is able to listen in on and copy Internet transmissions.
Term
Encryption
Definition
The coding of information using a mathematical-based program and secret key, it mkaes a message illgible to casual observers or those without the decoding key.
Term
Firewall
Definition
A coputer that provides a defense between one netowrk and another network that coupld pose a threat to the inside network. All traffic to and from the network must pass through this. Only authorize traffic, as defined by the local security policy, is allowed to pass through.
Term
First-party Cookies
Definition
a cookie that is placed on the client computer by the web server site.
Term
hash
Definition
the process used to calculate a number from a message.
Term
integrity
Definition
The category of computer security that addressed the validity of data; confirmation that data has been modified.
Term
Instrusion dection System
Definition
A part of a firewall that monitors attempts to log in to servers and analyzes those attempts for patterns that might indicate a cracker's attack is underway.
Term
Java Sandbox
Definition
A web browser security feature that limited the actions that can be preformed by a Java applet that has been downloaded from the web.
Term
JavaScript
Definition
A scripting language developed by Netscape to enable Web page designers to build active content.
Term
Masquerading(spoofing)
Definition
Pretending to be someone your not or representing a website as an original when it is an imposter.
Term
Persistent Cookie
Definition
A cookie that exists indefinitely
Term
Phishing
Definition
a masquerading attack that combines spam with spoofing. The perpectrator sends millions of spam emails that appear to be an respectable company. The email contrain a link to a web page that is designed to look exactly like the company's site. The victim is encouraged to enter his or her username or password, and sometime credit card information.
Term
Plug-ins
Definition
An application that helps browser to display info but is not part of the browser.
Term
Pretty Good Privacy (PGP)
Definition
A popular technology used to implement public-key encryption to protect the privacy of email messages.
Term
Private Key
Definition
A single key that is used to encrypt and decrypt messages.
Term
Public Key
Definition
One of a pair of mathematically related numeric keys, it is used to encrypt messages and is freely distributed to the public.
Term
Secure Sockets Layer (SSL)
Definition
A protocol for transmitting private information securely over the Internet.
Term
Security Policy
Definition
A written statement describing assets to be protected, the reasons for protecting the assets, the parties responsilbe for proctections, and acceptable and unacceptable behaviors.
Term
Session Cookie
Definition
A cookie that exists only until you shut down your browser.
Term
Sniffer Program
Definition
A programs that taps into the Intenet and records information that passes through a router from the data's source to its destination.
Term
Stateless Connection
Definition
A connection between a client and server over the Internet in which each transmission of information is independent; no continuous connection is maintained.
Term
Third-party cookies
Definition
a cookie that orginiates on a web site other than the site being visited.
Term
Trust/untrusted network
Definition
A network that within/outside a firewall.
Term
warchalking
Definition
The practice of placing chalk mark on a building that has an easily entered wireless network.
Term
wardrivers
Definition
networks attackers who drive around in cars using their wireless-equipped lap top computers to search for unprotected wireless network access points.
Term
zombie
Definition
a program that secretly takes over another computer for the purpose of launching attacks on other computers.
Supporting users have an ad free experience!