Shared Flashcard Set

Details

Security + Chapter 2
Security + Chapter 2
26
Computer Science
Not Applicable
08/02/2012

Additional Computer Science Flashcards

 


 

Cards

Term
Malware
Definition
Software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent.
Term
Virus
Definition
Code that runs on a computer without the user’s knowledge; it infects the computer when the code is accessed and executed.
Term
Worm
Definition
Code that runs on a computer without the user’s knowledge; they self-replicate, whereas a virus does not.
Term
Trojan Horse
Definition
Applications that appear to perform desired functions but are actually performing malicious functions behind the scenes.
Term
Spyware
Definition
A type of malicious software either downloaded unwittingly from a website or installed along with some other third-party software.
Term
Adware
Definition
Type of spyware that pops up advertisements based on what it has learned about the user.
Term
Grayware
Definition
A general term used to describe applications that are behaving improperly but without serious consequences; often describes types of spyware.
Term
Rootkit
Definition
A type of software designed to gain administrator-level control over a computer system without being detected.
Term
Logic Bomb
Definition
Code that has, in some way, been inserted into software; it is meant to initiate some type of malicious function when specific criteria are met.
Term
Easter Egg
Definition
A platonic extra added to an OS or application as a sort of joke; the harmless cousin of the logic bomb.
Term
Time Bomb
Definition
Trojans set off on a certain date.
Term
Botnet
Definition
A group of compromised computers used to distribute malware across the
Internet; the members are usually zombies.
Term
Zombie
Definition
The individual compromised computers in a botnet.
Term
Spam
Definition
The abuse of electronic messaging systems such as e-mail, broadcast media,
and instant messaging.
Term
Active Interception
Definition
Also known as active inception in the CompTIA 2008 Security+
objectives; normally includes a computer placed between the sender and
the receiver in an effort to capture and possibly modify information.
Term
Open Mail Relay
Definition
Also known as an SMTP open relay; it enables anyone on the Internet
to send e-mail through an SMTP server.
Term
HIDS
Definition

Host-Based Intrusion Detection System

 

A type of system loaded on an individual computer; it analyzes and monitors what happens inside that computer, for example, if any changes have been made to file integrity.

Term
Pop-Up Blocker
Definition
An application or add-on to a web browser that blocks pop-up
windows that usually contain advertisements.
Term
Ad Filtering
Definition
Ways of blocking and filtering out unwanted advertisement; popup
blockers and content filters are considered to be ad filtering methods.
Term
Content Filters
Definition
Individual computer programs that block external files that use
JavaScript or images from loading into the browser.
Term
Personal Firewall
Definition
Applications that protect an individual computer from unwanted
Internet traffic; they do so by way of a set of rules and policies.
Term
Privilege Escalation
Definition
The act of exploiting a bug or design flaw in a software or
firmware application to gain access to resources that normally would’ve been protected
from an application or user.
Term
Backdoors
Definition
Used in computer programs to bypass normal authentication and other
security mechanisms in place.
Term
Hardware Security Module
Definition
A physical device that deals with the encryption
of authentication processes, digital signings, and payment processes.
Term
Bluejacking
Definition
The sending of unsolicited messages to Bluetooth-enabled devices
such as mobile phones and PDAs.
Term
Bluesnarfing
Definition
The unauthorized access of information from a wireless device
through a Bluetooth connection.
Supporting users have an ad free experience!