1/18
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Malware
software that is intended to damage or disable computers and computer systems.

Virus
A piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data

Worm
a software program capable of reproducing itself that can spread from one computer to the next over a network, without any human interacction.

Keylogger
a malicious program that records keystrokes.

Social Engineering
hackers use their social skills to trick people into revealing access credentials or other valuable information

Shoulder surfing
Gaining compromising information through observation (as in looking over someone's shoulder).

Phishing
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information

Brute force attack
the password cracker tries every possible combination of characters

denial of service attack
a cyber attack in which an attacker sends a flood of data packets to the target computer, with the aim of overloading its resources

Man in the middle attack
a hacker placing himself between a client and a host to intercept communications between them

Data interception
Listening' to data as it passes from one device to another

SQL Injection
An attack that targets SQL servers by injecting commands to be manipulated by the database.

Penetration Testing
A live test of the effectiveness of security defenses through mimicking the actions of real-life attackers

Anti malware software
Software designed to stop malware from damaging a computer or network

Firewall
a part of a computer system or network that is designed to block unauthorized access while permitting outward communication.

User Access Levels
A network policy that defines which users can see which folders and files and the type of access they have to them. Eg: Read-Only or Read-Write.

Passwords
private phrases or words that give a particular user a unique access to a particular program or network

Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.

Physical security
tangible protection such as alarms, guards, fireproof doors, fences, and vaults
