Chapter9carolinepattiejulia

From GGCWiki
Jump to: navigation, search
  1. Adware- Is any software package which automatically renders advertisements in order to generate revenue for its author.
  2. Antivirus software- Is a computer software used to prevent, detect and remove computer viruses.
  3. Backdoor program- Is a means of access to a computer program that bypasses security mechanisms.
  4. Backup- Refers to copying and archiving of a computer data so it may be used to restore the original after a data loss event.
  5. Biometric authentication device- Is any process that validates the identity of a user who wishes to sign into a system by measuring some intrinsic characteristic of that user.
  6. Black hat hacker- Is an individual with an extensive computer knowledge whose purpose is to breach or bypass internet security- Is a flaw in a security system that allows an attacker to go through security systems to have access to networks.
  7. Boot-sector virus- A popular way to spread virus when floppy disks were widely used.
  8. Botnet- a network of private computer infected with malicious software and controlled as a group without the owners knowledge.
  9. Cookie- A message given to a web browser by a web server.
  10. Cybercrime- Crime conducted via the internet or some other computer network.
  11. Cybercriminal- Is a term for any illegal activity that uses a computer as its primary means of commission.
  12. Cyberloafing- Is anytime you're on the web at work doing non-work related activities.
  13. Data file- Is a computer file which stores data to be use by a computer application or system.
  14. Denial of Service (DoS) attack- Is an attempt to make a machine or network resource unavailable to its intended users.
  15. Distributed Denial of Service attack (DDoS) attack- Is a malicious attempt to make a server or a network resource unavailable to users.
  16. Drive-by download- Means two things: each concerning the unintended download of a computer software form the internet.
  17. Dynamic addressing- That is assigned automatically by the system to a device, account or user when it is connected to the network.
  18. E-mail virus- A virus that comes within an attached file in an e-mail message.
  19. Encryption virus- A virus using encryption to hide itself from virus scanners.
  20. Firewall- A part of a computer system or network that is designed to block unauthorized access while permitting outward communication.
  21. Hacker- A person who uses computer to gain unauthorized access to data.
  22. Hoax:False information published with the purpose of deceiving others
  23. Identity theft:Stealing someone’s credentials, so as to impersonate them online
  24. Image backup:A copy of an entire computer system
  25. Incremental backup:A type of backup that only backs up files that have changed since the last time files were backed up
  26. Inoculation:Detects virus activity by comparing old and current qualities of files
  27. IP address:Every computer connected to the internet has one
  28. Keystroke logger:Software used to steal passwords by recording keystrokes
  29. Logic bomb:A computer virus that delays execution until a certain set of conditions is met
  30. Logical port:A virtual communication path that is used to organize network requests by service
  31. Logical port blocking:Firewalls are configured to ignore requests that originate from the internet asking for certain parts
  32. Macro virus:A virus hidden in a Word or Excel document
  33. Malware:Examples include viruses, spyware, worms, and trojan horses
  34. Master boot record:A program that executes whenever a computer boots up, ensuring that the virus will be loaded into memory immediately
  35. Multipartite virus:Virus designed to infect multiple file types in an effort to fool the antivirus software
  36. Network address translation:A process used by firewalls to assign internal IP addresses on a network
  37. Packet:Data that your computer sends and receives
  38. Packet filtering:Process in which firewalls filter out packets sent to specific logical ports
  39. Packet sniffer:A packet sniffer is a program deployed by hackers that looks at each packet as it travels on the internet
  40. Personal firewall:A firewall specifically designed for home networks
  41. Pharming:Directing users to bogus websites
  42. Phishing:Using emails to lure people into revealing personal information
  43. Polymorphic virus:A type of virus that changes its own code or periodically rewrites itself to avoid detection
  44. Pretexting- the practice of presenting oneself as someone else in order to obtain private information.
  45. Program file- a folder first found in Microsoft Windows 95 and included in all later versions of Microsoft Windows that stores the software programs install on your computer.
  46. Quarantining- To take a spyware or virus-infected file out of harm's way by stripping its rights or by moving it to a folder that cannot be easily accessible by regular file management utilities.
  47. Script- a list of commands that can be executed without user interaction.
  48. Script kiddy- a person who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own.
  49. Social engineering- is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
  50. Spam- Unwanted, unsolicited e-mail
  51. Spam filter- helps block unwanted, unsolicited e-mail.
  52. Spyware- An unwanted piggyback program that usually downloads with software you are installing from the internet.
  53. Static addressing- makes broadband users more vulnerable to attacks; a number (in the form of a dotted quad) that is assigned to a computer by an Internet service provider (ISP) to be its permanent address on the Internet.
  54. Stealth virus- temporarily erases its code from the files where they reside and then hides in the computer's active memory
  55. Surge protector- an appliance designed to protect electrical devices from voltage spikes. A surge protector attempts to limit the voltage supplied to an electric device by either blocking or by shorting to ground any unwanted voltages above a safe threshold.
  56. Time bomb- computer program that has been written so that it will stop functioning after a predetermined date or time is reached.
  57. Trojan horse- A computer virus normally attaches itself to another computer program; appears to be useful but is actually harmful
  58. Uninterruptable power supply (UPS)- is a device that allows a computer to keep running for at least a short time when the primary power source is lost.
  59. Urban legend- A hoax that becomes accepted by society
  60. Virus- a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
  61. Virus signature- is the portion of virus code that is unique to a particular computer virus.
  62. White hat hacker- Hackers who use their knowledge to break into systems just for the fun of it
  63. Whole-house surge protector- A surge protector that protects all electrical devices in the house
  64. Worm- Attempts to infect computers through network connections
  65. Zombie- A hacked computer used remotely by a hacker to launch attacks on other computer systems

Julia Decker Sarah Caroline Reeves Patricia Juarez

Personal tools