1/59
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Pretexting
deceiving by pretending to be someone else
Phishing
obtaining unauthorized access to data via email
Spoofing
someone pretending to be someone else.
Sniffing
intercepting computer communications
Usurping
invading a computer system and replacing legitimate programs with their own unauthorized programs that disrupt services.
Malware
Viruses, Worms, Trojan Horse, Spyware and Adware
Virus
is a computer program that replicates itself ultimately consuming the computer's resources
Worms
are viruses that propagate themselves using the Internet or other computer networks
Spyware/Adware
invade your computer and capture keystroke information. Spyware does so for malicious reasons and Adware just does so to report activity to allow for targeted ads
Beacons
are tiny files that gather demographic information about you. Your info can then be sold several times a day and constitute a profile of your likes and habits. Lotame Solutions specializes in Beacons
Bot
is a new term for the family of Viruses, Worms, Trojan Horse, Spyware and Adware
Bot herder
refers to the individual or organization that controls the Bots. North Korean Armay is responsible for most bots in the US since 2009. The Chinese Army is another primary source of Bots.
Honeypots
are false targets for criminals to attack
electronic counter-measures
Firewalls
Encryption
Additional Passwords
Antispyware/anti-adware software
Backups/ RAID, off site backup storage
Internet
is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals
The Internet originated as
ARPANET
ARPANET had two main goals
1. Allow scientists at different physical locations to share information and work together
2. Function even if part of the network were disabled or destroyed by a disaster
host
provides connections and services to other computers on a network.
2 ways to connect to the internet
1. With wired connections, a computer or device physically attaches via a cable or wire to a communications device.
2. Computers without a communications device can use a wireless modem hooked to USB port using a cellular connection.
3 ways we make up a wired connection:
1. Cable Internet service
2. DSL (digital subscriber line)
3. Fiber to the Premises (FTTP) .
There are 4 ways to make up a wireless connection:
1. Wi-Fi (wireless fidelity)
2. Mobile broadband
3. Fixed wireless
4. Satellite Internet Service
Bandwidth
he amount of data that travels over a network.
IP address
a sequence of numbers that uniquely identifies each computer or device connected to the Internet
domain name
a text-based name that corresponds to the IP address
DNS server
translates the domain name into its associated IP address
World Wide Web (WWW), or web
consists of a worldwide collection of electronic documents (webpages)
website
a collection of related webpages and associated items
web server
a computer that delivers requested webpages to your computer
Web 2.0
refers to websites that provide a means for users to share personal information, allow users to modify website content, and provide applications through a browser
browser
an application that enables users with an Internet connection to access and view webpages on a computer or mobile device
home page
the first page that a website displays
search engine
software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic
subject directory
classifies webpages in an organized set of categories, such as sports or shopping, and related subcategories
graphic
a digital representation of non-text information. Graphic formats include BMP, GIF, JPEG, PNG, and TIFF
info-graphic
a visual representation of data and information, designed to communicate quickly, simplify complex concepts, or present patterns or trends
he transmission of messages and files via a computer network
email program
allows you to create, send, receive, forward, store, print, and delete email messages
email list
a group of email addresses used for mass distribution of a message
Instant messaging (IM)
a real-time Internet communications service
discussion forum
an online area in which users have written discussions about a particular subject
VoIP (Voice over IP)
enables users to speak to other users over the Internet
FTP (File Transfer Protocol)
an Internet standard that permits file uploading and downloading to and from other computers on the Internet.
3 functions of ISP
1)provides you with an internet address
2) serves as a gateway to the internet
3)pays for your access service.
3 ways you connect to the internet:
1) Digital Subscriber Line (DSL)
2) Cable Modem
3) Wi-Fi
What is IS Risk Assessment?
Risk Assessment is the process of evaluating the potential vulnerability of IS systems
What is Risk Management?
Risk Management is the process of placing safeguards in place to reduce the vulnerability to a risk.
How do we conduct a Risk Assessment?
Identify all known risks
Identify impact
Assessment likelihood of risk
Determine mitigation plan
What are some vulnerabilities that put IS systems at risk?
Electronic intrusions (Hacking, Viruses, Adware, Trojans)
Electronic theft of data (stolen passwords, unprotected system access)
Human Error (software vulnerabilities)
Employee theft (Fraud, embezzlement)
Hardware failures (failure to backup and protect data, system server loss)
Computer Crime (Pretexting, Phishing, Spoofing, Sniffing)
Programming Errors (faulty code that generate accounting errors)
cybercafé
a location that provides computers with Internet access, usually for a fee
Internet service provider (ISP)
a business that provides individuals and organizations access to the Internet free or for a fee
Electronic bulletin boards
online communication systems where one can share, request, or discuss information on just about any subject. E-mail is a way to converse privately with one or more people over the Internet; electronic bulletin boards are public.
blog
an online journal or informational website displaying information in the reverse chronological order, with latest posts appearing first. It is a platform where a writer or even a group of writers share their views on an individual subject
Calendaring software
software that minimally provides users with an electronic version of a calendar
Desktop sharing
a common name for technologies and products that allow remote access and remote collaboration on a person's computer desktop through a graphical terminal emulator.
podcast
an episodic series of digital audio files that a user can download in order to listen. Alternatively, the word "podcast" may refer to the individual component of such a series or to an individual media file.
RSS
Really Simple Syndication,
a type of web feed which allows users and applications to access updates to websites in a standardized, computer-readable format. These feeds can, for example, allow a user to keep track of many different websites in a single news aggregator
Web-based project management software
a type of software that allows users to work on collaborative projects online.
Web conferencing
may be used as an umbrella term for various types of online collaborative services including web seminars, webcasts, and peer-level web meetings.
webcast
a media presentation distributed over the Internet using streaming media technology to distribute a single content source to many simultaneous listeners/viewers.
Unified communications (UC)
business and marketing concept describing the integration of enterprise communication services such as instant messaging (chat), presence information, voice (including IP telephony), mobility features