Term
|
Definition
advertising that is integrated into a software program |
|
|
Term
|
Definition
a program that enables a hacker to take complete control of a computer without the legitimate user's knowledge or permission |
|
|
Term
|
Definition
small text files that some websites automatically store on a client computer's hard drive when a user visits the site. |
|
|
Term
|
Definition
shows what types of cookies will be shown; allows the computer user to specify what they want to hide and what they don't mind sharing |
|
|
Term
|
Definition
an attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system to tie up its resources and deny legitimate users access. |
|
|
Term
distributed denial-of-service (ddos) |
|
Definition
automated attacks that are launched from more than one zombie computer at the same time. |
|
|
Term
|
Definition
a program or file that is designed to specifically damage or disrupt a system, such as a virus. |
|
|
Term
|
Definition
a network added between a protected network and an extended network in order to provide an additional layer of security. |
|
|
Term
|
Definition
a heavily secured server located on a special perimeter network between the company's secure internal network and the firewall. |
|
|
Term
|
Definition
acts as a go-between for computers on the internal network and the external network (the internet). |
|
|
Term
|
Definition
a type of email scam designed to steal someone's identity. |
|
|
Term
|
Definition
a procedure in which the key for coding is generally distributed as a public key that may be placed on a website. anyone wishing to send a message codes it using the punlic key. the recipient decodes the message with a private key. |
|
|
Term
|
Definition
servers that keep track of who is logging on to the network and which services on the network are available |
|
|
Term
|
Definition
|
|
Term
|
Definition
one half of a pair of binary files that needed to decrypt an encrypted message. the private key is kept only by the individual who created the key pair and is never distributed to anyone else. the private key is used to decrypt messages created with the corresponding public key. |
|
|
Term
|
Definition
one half of a pair of binary files that is needed to decrypt a encrypted message. after creating the keys the user distributes the public key to anyone he wishes to send him encrypted messages. a message encrypted with a public key can be unencrypted only using the corresponding private key. |
|
|
Term
|
Definition
|
|
Term
|
Definition
a software that secretly collects information about a user while they browse and navigate around the internet. |
|
|
Term
|
Definition
a computer program that appears to be something useful or desirable (such as a game or a screensaver) but at the same time does something malicious in the background without the user's knowledge. |
|
|
Term
|
Definition
a piece of code introduced secretly into a system in order to corrupt it or destroy the data |
|
|
Term
|
Definition
viruses that replicate themselves into the master boot record of a floppy or hard drive |
|
|
Term
|
Definition
viruses that run when a certain set of conditions are met, such as a specific date keyed off of the computer's internal clock. |
|
|
Term
|
Definition
viruses that are distributed bu hiding them inside a macro |
|
|
Term
|
Definition
a virus that changes its virus signature (the binary pattern that makes the virus identifiable) every time it infects a new file. this makes it more difficult for anitvirus programs to detect the virus. |
|
|
Term
|
Definition
viruses that temporarily erase code from the files where they reside and hide in the active memory of the computer. |
|
|
Term
|
Definition
portions of the virus code that are unique to a particular computer virus and make it identifiable by antivirus software. |
|
|
Term
|
Definition
a program that attempts to travel between systems through network connections to spread infections. worms can run independently of host file execution and are active in spreading themselves. |
|
|