Shared Flashcard Set

Details

AIS
unit 1b
51
Accounting
Undergraduate 4
05/02/2012

Additional Accounting Flashcards

 


 

Cards

Term
1. Address Resolution Protocol:
Definition
Sending fake ARP messages to an Ethernet LAN. ARP is a computer networking protocol for determining a network hosts hardware address only its IP or network
Term
2. Adware:
Definition
Software that collects and forwards data to advertising companies or causes banner ads to pop us as the internet is surfed
Term
3. Blue bugging:
Definition
Taking control of a phone to make calls send texts etc.
Term
4. Bluesnarfing:
Definition
Stealing contact lists, images, and other data
Term
5. Botnet, bot herders:
Definition
A network of hijacked computers. Bot herders use hijacked computers for various computer attacks
Term
6. Buffer Overflow attack:
Definition
Inputting so much data that the input buffer overflows.
Term
7. Caller ID spoofing:
Definition
Displaying an incorrect number on the recipient Caller ID display
Term
8. Carding:
Definition
Verifying credit card validity, buying and selling credit cards
Term
9. Chipping:
Definition
Planting a chip that records transaction data in a legitimate credit card reader
Term
10. Cross-Site scripting:
Definition
Exploit web page security vulnerabilities to bypass browser security mechanism and create a malicious link that injects unwanted code into a website
Term
11. Cyber-Bulling:
Definition
Using computer technology to harm another person
Term
12. Cyber-extortion:
Definition
Requiring a company to pay money to keep an extortionist from harming a computer or a person
Term
13. Data diddling:
Definition
Changing data before, during, or after it is entered into the system
Term
14. Data Leakage:
Definition
Unauthorized copying of company data
Term
15. Denial of Service attack:
Definition
An attack designed to make computer resources unavailable to its users
Term
16. Diction Attack:
Definition
Using software to guess company addresses, send employees blank e-mails, and add unreturned messages to spammer’s e-mail
Term
17. DNS Spoofing:
Definition
Sniffing the ID of a Domain Name System request and replaying before the real DNS sever
Term
18. Eavesdropping:
Definition
Listening to private voice or data
Term
19. E-mail Spoofing:
Definition
Making a sender address and other parts of an e-mail header appear as though the e-mail originated from different source
Term
20. Evil Twin:
Definition
A wireless network with the same name as another wireless access point.
Term
21. Hijacking:
Definition
Unauthorized access, modification, or use of computer systems, usually by means of a PC
Term
22. IP address spoofing:
Definition
Creating Internet Protocol packets with a forged IP address to hide the sender’s identity or to impersonate another computer system
Term
23. Identity theft:
Definition
Assuming someone’s identity by illegally obtaining confidential information such a social security number
Term
24. Internet auction fraud:
Definition
Using an internet auction site to commit fraud
Term
25. Internet Misinformation:
Definition
Using the information to spread false or misleading information
Term
26. Internet pump an dump fraud:
Definition
Using internet to pump the price of a stock and then dump it
Term
27. Key logger:
Definition
Using spyware to record a user’s keystrokes
Term
28. Lebanese Looping:
Definition
Inserting a sleeve into an ATM so that it will not ejecting the victim’s card pretending to help the victim as a means to discover his or her PIN and then using the card and PIN to drain the account
Term
29. Logic bombs and time bombs:
Definition
Software that sits idle until a specified circumstance or time triggers it
Term
30. Malware:
Definition
Software that can be used to do harm
Term
31. Man in the Middle:
Definition
Hacker placing himself between a client and a host to intercept network traffic
Term
32. Masquerading:
Definition
Accessing a system by pretending to be an authorized user
Term
33. Packet Sniffing:
Definition
Inspecting information packets as they travel the Internet
Term
34. Pharming:
Definition
Redirecting traffic to a spoofed web site to obtain confidential information
Term
35. Phishing:
Definition
Communications that request recipients to disclose confidential information by responding to an e-mail or visiting a web page
Term
36. Piggybacking:
Definition
Using somebody else’s website
Term
37. Podslurping:
Definition
Using a flash drive or iPod to steal information
Term
38. Pretexing:
Definition
Acting under false pretenses to gain confidential information
Term
39. Rootkit:
Definition
Software that conceals processes, files, network connections and system data from the operating system
Term
40. Run-down failure:
Definition
Truncating interest calculations at two decimal places and placing truncated amounts in the perpetrators account
Term
41. Salami Technique:
Definition
Stealing tiny slices of money over time
Term
42. Scareware:
Definition
Malicious software of no benefit that is sold using scare tactics
Term
43. Skimming:
Definition
Double-swiping a credit card or covertly swiping it in a card reader that records data for later
Term
44. SMS spoofing:
Definition
Using short message to change the name or number a text message appears to come from
Term
45. Spolg:
Definition
A spam blog that promotes web sites to increase the Google page rank
Term
46. Spyware:
Definition
Software that monitors computing habits and sends that data to someone else
Term
47. Spoofing:
Definition
Sending electronic data that looks like it’s from somebody else
Term
48. Typosquatting/URL Hijacking:
Definition
Getting a name of a url one or two letters off from legit site.
Term
49. Virus:
Definition
Executable code that attaches itself to software replicates itself and spreads to other systems or files, triggered by a predetermined event.
Term
50. Vishing:
Definition
Voice phishing in which e-mail recipients are asked to call a phone number and divulge confidential information
Term
51. Worm:
Definition
Similar to virus, a program rather than a code segment hidden in a host program and actively transmit it to other systems.
Supporting users have an ad free experience!