Shared Flashcard Set

Details

Computer and Internet Crime
Chapter 3
35
Other
Undergraduate 1
04/12/2012

Additional Other Flashcards

 


 

Cards

Term
Exploit
Definition
An attack on an ifnroation system that teks adcantage of a particular system vulnerability.
Term
Zero-Day Attack
Definition
An attackthat takes place before the security community or software developers knows about the culnerabukuty or has been able to repair it.
Term
Virus
Definition
A piece of programming code, usually disguised as something else that causes a computer to behace in an unexpected and usually undesirable manner.
Term
Worm
Definition
A harmful program that resides in the active memory of the computer and duplicates itself.
Term
Trojan Horse
Definition
A program in which malicious code is hidden inside a seemingly harless program.
Term
Logic Bomb
Definition
A type of Trojan horse that executes when it is triggered by a specific event.
Term
Botnet
Definition
A large group of computer controlled centrally from one or more remote locations by hackers, without the knowledge or consent of their owners.
Term
Distributed Denial of Service Attact (DDoS)
Definition
An attack in which a malicious hacker takes over computers on the internet and causes them to flood a target site with demands for data and other small tasks
Term
Rootkit
Definition
A set of programs that enable its user to gain administrator level access to a computer without the end user's consent or knowledge.
Term
E-mail Spam
Definition
The abuse of e-mail systems to send unsolicited e-mail to large numbers of people.
Term
Completely Automated Public Turing Test to Tell Computer and Humans Apart (CAPTCHA)
Definition
Software that generates and greades tests that humans can pass but all but the most sophisticated computer programs cannot.
Term
Puishing
Definition
The act of using e-mail fraudulently to try to get the recipient to reveal personal data
Term
Spear-phishing
Definition
A cariation of phishing in which the phisher send fraudulent e-mails to a certain organization's employees. The phony e-mails are designed to look like they come from high level executives withing the organization.
Term
Hackers
Definition
Someone who tests the limitations of information systems out of intellectual curiosity to see if he or she can gain access.
Term
Lamers
Definition
A technically inept hacker.
Term
Script Kiddies
Definition
A technically inept hacker.
Term
Crackers
Definition
Someone who breaksinto other people's networks and systems to cause harm.
Term
Collusion
Definition
Cooperation between two or more people often an employee and a company outsider to commit fraud.
Term
Industrial spies
Definition
Someone who uses illegal means to obtain trade secrets from competitors of their firm.
Term
Competitive Intelligence
Definition
Legally obtained information gathered to help a company gain an advatage over its rivals.
Term
Cybercriminals
Definition
An individual motivated by the ptential for monetary gain who hacks into corporate computers to steal often by transferring money from one account to anoter to anoter.
Term
Smart Cards
Definition
A form of debit or credit card that contains a moemory chip that is updated with encrypted data every time the card is used.
Term
Hacktivism
Definition
Hacking to achieve a political or social goal.
Term
Cyberterrorist
Definition
An individual who lauches comuter based attacks against other computer or network in an attempt to intimidate or coerce a government in order to adcance certain political or social objectives.
Term
Trustworthy Computing
Definition
A method of computing that delivers secure, private, and reliable computer experiences baded on sound business practices.
Term
Risk Assessment
Definition
The process of assessing security related risks from other internal and external threats to an organization's computers and networks.
Term
Reasonable Assurance
Definition
A concept in computer security that recognizes that managers muse user their judgement to ensure that the cose of contorl dose not exceed the system's benefits or the risks involved.
Term
Security Policy
Definition
A witten statement that defines an organization's security requirements as well as the controls and sanctions needed to meet those requirements.
Term
Virtual Private Network (VPN)
Definition
A technology that uses the internet to relay communications maintaining privacy through security procedures and tunneling protocols which encrypt data at the sending end and decrypt it at the receving end.
Term
Firewall
Definition
A hardware or software device that serves as a barrier between an organization's network and the internet a firewall also limits access to the company's network based on the organizations's internet usage policy.
Term
Intrusion Percention Systems (IPs)
Definition
A network security device that prevents an attack by blocking viruses, malfored packets and other threats from getting into the prtected network.
Term
Amtivirus Software
Definition
Software that regularly scans a computer's memory and disk drives for viruses.
Term
Viruse Signature
Definition
A specific sequence of bytes that indicates to antivirus software that a specific virus is present.
Term
Security Audit
Definition
A process that evaluates whether an organization has a well considered security policy in place and if it is being followed
Term
Intrusion Detection System
Definition
Software and our hardware that monitors systems and network resouces and activities and notifies network security personnel when it identifies possible intrusions from outsed the organization or misuse from within the organization.
Supporting users have an ad free experience!