Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
33 Cards in this Set
- Front
- Back
What is a computer network? |
A group of computers connected with eachother, through wires, optical fibers of links so various devices can communicate with each other |
|
What are 6 threats to a computer network? |
1. Malware 2. Phishing 3. Bot Net 4. Spam 5. Denial of service attacks 6. Industrial espionage |
|
What is malware?(malicious software) |
Malicious software designed to change computer settings, erase software cause errors etc. It uses malicious ways to install itself to your computer |
|
What are 5 types of malware? |
1. Logic bomb 2. Virus 3. Worm 4. Trojan horse 5. Spyware |
|
What is logic bomb? |
A piece of code inserted into an operating system that implements a malicious function after a period of time, or specific conditions are met |
|
What is a Virus? |
A program designed to cause damage, steal information, modify data, send emails etc. Or a combination of these |
|
What is a Worm? |
A destructive self replicating program containing code capable to gain access into computers or networks. Once inside the worm hams by deleting, modifying, distributing or manipulating data |
|
What's is a Trojan Horse? |
A program that appears to be something safe but is performjng tasks such as getting access to you computer |
|
What is a Keylogger? |
Alternatively refered to a as a key stroke logger is a software program or hardware device that is used to monitor and logg each key a user types. The installer can veiw all keys typed by the user. |
|
What is Adware? |
A software that displays unwanted advertisements. They tend to bombard your device you device with pop up adds, change your homepage and add Spyware |
|
• What is Phishing? |
Used to describe a malicious group of individuals who scam users by creating fake emails and web pages to collect users banking and login info |
|
What is Pharming? |
Is creating a simular webpage to a company's web page to decieve visitors thinking that it is another company's web page. However when login info etc are entered, they are captured for the creators use |
|
What is Bot Net? (Zombie network. |
A group of infected computers controls my 1 or more persons used to perform malicious tasks impossible for a single computer to do |
|
What is Spam? |
The use of electronic messaging systems to send out unwanted and unrequested messages and emails in bulk |
|
Denial of Service Attack |
Method of attacking networks by sending it an abnormally high number of requests causing it to slow down fail, usually send by zombie and worm computers |
|
What is Identify theft? |
Illegally obtained a person's personal information such as name, address, date of birth, bank info etc. And use this information to pose as that person or sell their information |
|
What is easedroppjng? |
Electronic attack where digital conversations are intercepted by which they weren't intended for. |
|
What's industrial espionage? |
Pccasion where one company steal information from another company with which it is competing |
|
Credit card fraud |
Illegally using another person's credit card for purchases without their permission. |
|
Methods of securing computer networks |
---> |
|
What are firewalls? |
They work by blocking or refreshing network ports to prevent unauthorized access. A software or hardware utility that filters data going in and out the network |
|
Antivirus |
Also referred to as AVS (anti-virus software) software utility designed to protect your computer from viruses, if a virus is detected it displays are warning asking what action is to be taken |
|
Anti spyware |
Similar to an anti-virus, used to block and prevent malware infections of computers by monitoring emails, websites etc. |
|
Network monitors |
A system used to monitor networks and notify administrators when a device fails or outtage occurs |
|
Training employees |
Edu acting employees of how to apsafeky use a network so that makware are not downloaded or spread |
|
Locks (computer locks) |
Able to keep laptops and desktops computers secured to the desk so that persons cannot steal any component |
|
Security Guard |
A person whose job is a guard a place for and make sire the people are not harmed |
|
Surveillance camera |
A video camera used to observe a location used to check if unauthorized persons are gaining access to a buiding or room |
|
Motion detector |
A sensor that detects physical kinetic movements on a device within an environment in real time. |
|
Keypad |
A device with a set of buttons or keys used to enter codes to gain access to a place |
|
Encrytion |
Process of encoding messages so that ut can only be dead by the sender and intended receiver |
|
Username and password |
A undername is a unique name used to identify someone on a computer system. It is usually paired with a password together they are referred to as a login. Passwords are s string of characters kept secret and used for authenticating a user on a computer system. |
|
Turnkey solutions |
Easily implemented pre-made ready to be used system that can be used in current business processes. They prevent identity theft and keep their networks secure. Information provided by social media sites will also be stored secure and business will be alerted if there is any suspicious activity in any of the accounts. |