Sunday, March 18, 2012

Chapter 10 Key Terms:

Access-Control Software:
Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files they can see but not change.

Example: Access control software doesn’t need to treat all users identically.
Antivirus:
A program designed to search for viruses, notify users when they're found, and remove them from infected files.

Example: Antivirus programs are designed to search for viruses.
Autonomous System:
Complex systems that can assume almost complete responsibility for a task without human input, verification, or decision-making.

Example: Complex system that can complete responsibility for a task without human input.
Backup:
The process of saving data especially for data recovery. Many systems automatically back up data and software onto disks or tapes.

Example: Insurance is a system of making regular backup.
Biometrics:
Measurements of individual body characteristics, such as a voiceprint or fingerprint; sometimes used in computer security.

Example: Finger print, Voice print, Retinal scan these measurements are collectively called Biometrics.
Botnets:
A malicious network made up of bots, or zombie computers, often used by spammers, phishers, and other Internet criminals.

Example: Malicious networks are often called Botnets.
Computer Crime:
Any crime accomplished through knowledge or use of computer technology.

Example: Computer crimes are accomplished though knowledge or use of computer technology.
Computer Security:
Protecting computer systems and the information they contain against unwanted access, damage, modification, or destruction.

Example: Computer Security refers to protecting computer systems.
Cybercrime:
Any crime accomplished through knowledge or use of computer technology.

Example: Cybercrime accomplished through knowledge or use of computer technology.
Denial-of-Service (DOS) Attack:
A type of computer vandalism that bombards servers and Web sites with so much bogus traffic that they're effectively shut down, denying service to legitimate customers and clients.

Example: Bombard servers and websites with so much bogus traffic.
Encryption:
Protects transmitted information by scrambling the transmissions. When a user encrypts a message by applying a secret numerical code (encryption key), the message can be transmitted or stored as an indecipherable garble of characters. The message can be read only after it's been reconstructed with a matching key.

Example: To protect transmitted information, many organizations and individuals use encryption software.
Firewall:
A software or hardware "gate" that protects internal networks from unauthorized access.

Example: Firewalls used to keep their networks secure.
Hacking:
Electronic trespassing and vandalism.

Example: Hacking could be stealing information.
Identity Theft:
The crime, committed by hackers or other unscrupulous individuals, of obtaining enough information about a person to assume his or her identity, often as a prelude to illegally using the victim's credit cards.

Example: Steal a persons Identity using there information.
Logic Bomb:
A program designed to attack in response to a particular logical event or sequence of events. A type of software sabotage.

Example: Logic bomb is programmed to attack in response to a particular event or sequence of event.
Malware:
Malicious software, especially destructive programs such as the viruses, worms, and Trojan horses devised and spread by computer saboteurs.

Example: Modern computer saboteurs commonly use Malware-malicious software.
Passwords:
The most common security tools used to restrict access to computer systems.

Example: Passwords are the most common tools used to restrict access to PCs.
Phishing:
The use of a deceptive email message or Web site to lure a person into divulging credit card numbers or other sensitive information.

Example: Internet fraud technique commonly called Phishing.
Sabotage:
A malicious attack on work, tools, or business.

Example: Sabotage comes from the early days of Industrial Revolution.
Security Patch:
Software programs that plug potential security breaches in an operating system, often provided as free downloads or automatic updates to all owners of the OS.

Example: Microsoft and Apple release Security patches.
Smart Weapons:
A missile that uses computerized guidance systems to locate its target.

Example: Smart weapons missiles that use computerized guidance system.
Social Engineering:
Slang for the use of deception to get individuals to reveal sensitive information.

Example: Credit card theft, password theft and identity theft often involves Social Engineering.
Spoofing:
A process used to steal passwords online.

Example: Trick the target in to doing something they might not otherwise do.
Spyware:
Technology that collects information from computer users without their knowledge or consent.

Example: Spyware refers to technology that collects information.
System Administrator:
A user who has additional access privileges, such as permission to install software applications and change system settings.

Example: At lest one of the accounts on a PC or Mac must be System Administrator.
Trojan Horse:
A program that performs a useful task while at the same time carrying out some secret destructive act. A form of software sabotage.

Example: Trojan horse is a program that performs a useful task while at the same time carrying out some secret destructive act.
Uninterruptible power Supply (UPS):
A hardware device that protects computers from data loss during power failures.

Example: Uninterruptible power supply can protect computers from data lose during power failures.
Virus:
Software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. A form of software sabotage.

Example: Virus software is a piece of code usually hidden in the operating system.
Worms:
Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks, seeking out uninfected workstations to occupy. A form of software sabotage.

Example: Worms use hosts to reproduce and can travel independently over computer networks.

No comments:

Post a Comment