Term
|
Definition
Anytime a person accesses resournces in an unauthorized way. This may or may not be malicious. |
|
|
Term
|
Definition
To go through soneone's trash in search of information. |
|
|
Term
|
Definition
Using or manipulating pople inside the networking environment to gain access to that network from the outside. |
|
|
Term
|
Definition
Form of infiiltration and social engineering that involves following someone else through a door as if you belong. |
|
|
Term
|
Definition
Social engineering attack in which the attacker makes a phone call to someone in an organization to gain information. |
|
|
Term
|
Definition
Act of trying to get people to give their usernames, passwords, or other security informaiton by pretending to be someone else electronically. |
|
|
Term
|
Definition
Security concept using physical security, authentication, users and groups, and security policies. |
|
|
Term
|
Definition
Any method a computer uses to determine who can access it. |
|
|
Term
|
Definition
Hardware authentication invovling a credit-card sized card with ciruitry that can be used to identify the bearer of that card. |
|
|
Term
|
Definition
Hardware device used to support authentication; works by scanning and remembering unique aspects of a user's various body parts by using some form of sensing device such a s a retinal scanner. |
|
|
Term
|
Definition
User's combined permissions granted by multiple groups. |
|
|
Term
|
Definition
Windows tool used to set local secruity policies on an individual system. |
|
|
Term
|
Definition
Means of easily controlling the settings of multiple clients with policies such as setting minimum password length or preventing Registry edits. |
|
|
Term
|
Definition
System of organizing data according to its sensitivity. |
|
|
Term
|
Definition
Concept that members of an organization must abide by the rules of that organization. For a tech, its what software can and cannot be installed on an organizations computer. |
|
|
Term
|
Definition
Utility made availale as an MMC snap-in that enables users to monitor various system evens, including network bandwidth usage and CPU utilization. |
|
|
Term
|
Definition
Feature of Event Viewer's Security section that creates an entry in the Security Log when certain events happen. |
|
|
Term
|
Definition
Feature of Event Viewer's Secruity that creates an entry in the Security Log wien certain objects are accessed such as a file or folder. |
|
|
Term
|
Definition
The telling of certain events to a manager. Usually by pre-made forms. |
|
|
Term
|
Definition
Consists of computer programs designed to break into computers or cause havoc on computers. |
|
|
Term
|
Definition
Program that introduces into a user's computer experience without damaging any systems or data. |
|
|
Term
|
Definition
Irritating browser windows that appears automatically when you visit a website. |
|
|
Term
|
Definition
Grayware that runs in the background of a user's PC, sending information about browsing habits back to the company that installed it into the system. |
|
|
Term
|
Definition
Type of malicious program that downloads ads to a user's computer, generating undesirable network traffic. |
|
|
Term
|
Definition
Unsolicited emails from both legitimate businesses and scammers that accounts for a huge percentage of traffic on the internet. |
|
|
Term
|
Definition
Program that can make a copy of itself without your necessarily being aware of it. |
|
|
Term
|
Definition
Program that does something other than what the user who runs the program thinks it will do. |
|
|
Term
|
Definition
Very special form of virus. Does not infect other files but repliates by making cop;ies of itself on other sytems on a network by taking advantage of security weaknessins in networking protocols. |
|
|
Term
|
Definition
An addition to the operating system to patch a hole in the OS code. |
|
|
Term
|
Definition
Keeping your patches up to date. |
|
|
Term
|
Definition
Software designed to combat viruses by either seeking out and destroying them or passively guarding against them. |
|
|
Term
|
Definition
Passive monitoring of a computer's activity, checking for viruses only when certain events occur. |
|
|
Term
|
Definition
Code pattern of a known virus; used by antivirus software to detect viruses. |
|
|
Term
|
Definition
Virus that attemps to change its signature to prevent detection by antivurs programs, usually by continaully scrambling a bit of useless code. |
|
|
Term
|
Definition
A number generated by the software based on the contents of the file rather than the name, date, or size of that file. |
|
|
Term
|
Definition
Virus that uses various methods to hide from antivirus software. |
|
|
Term
Virus Definition or Data File |
|
Definition
Files that enable the virus protection software to recognize the viruses on your system and clean them. These files should be updated often. |
|
|
Term
|
Definition
Another name for the Core Antivirus Software Programming. |
|
|
Term
|
Definition
Repairing damage caused by a virus. |
|
|
Term
|
Definition
Device that restricts traffic between a local netgwork and the Internet. |
|
|
Term
|
Definition
Making data unreadable to those who do not possess a key or password. |
|
|
Term
Password Authentication Protocol (PAP) |
|
Definition
Oldest and most basic form of authentication. |
|
|
Term
Challenge Handshake Authentication Protocol (CHAP) |
|
Definition
Common remote access protocol; serving system challenges the remote client, usually by means of asking for a password. |
|
|
Term
|
Definition
Microsoft's variation of the CHAP protocol, which uses a slightly more advanced encryption protocol. Windows Vista uses MS-CHAP v2, and does not support MS-CHAP v. 1. |
|
|
Term
Internet Protocol Secruity (IPSec) |
|
Definition
Microsoft's encryption method of choice for networks consisting of multiple networks linked by a private connection, providing transparent encryption between the server and the client. |
|
|
Term
Secure Socket Layer (SSL) |
|
Definition
Security protocol used by a browser to crate secrue Web sites. |
|
|
Term
|
Definition
Form in which a public key is sent from a Web server to a Web browser so that the browser can decrypt the data sent by the server. |
|
|