1/265
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
What is HTML?
the language you use to create a web site
What is HTML an acronym for?
hypertext markup language
What is an HTML document?
a file that contains your website content and HTML formatting instructions
What is an HTML tag?
specifies the formatting and presentation of information on a web site
What are HTML tags used for?
to identify elements of an HTML document
What are fundamental components of the document's structure?
elements
Example of an element?
head, title, paragraphs, list, tables
What do HTML tags consist of?
What do tags come in?
pairs
Every HTML document should contain?
certain standard HTML tags
heading tag, where n is replaced with number 1-6
How many header sizes are there?
6
What is the largest size header?
1
What is smallest size header?
6
paragraph
unordered list (bullets)
ordered list (numbers)
list item
hard line break
horizontal rule
What is the purpose of an anchor tag?
to link to other documents
What replaces the file name in Text ?
the path and filename of the target document
What replaces the text in Text ?
the text to serve as the hyperlink in the document
How do you specify email address in href attribute?
replace "http://" with "mailto:"
What tag do you use to make your background an image?
(replace filename with the name of the background image)
What tag do you use to add a picture?
What is different about the img tag?
it does not have a beginning and ending tag
What are the attributes for the tag
src="filename"
border="size"
align="position"
width="size"
height="size"
What does the src= do?
when inserting an image, it allows you to specify the filename of the image
What does border= do when it comes to inserting images?
specifies if the border is included in the picture
What does align= do when it comes to inserting images?
specifies the alignment of the of the picture
What does width= do when it comes to inserting images?
specifies the width of the picture in percent or pixels
What does height= do when it comes to inserting images?
specify the height of the picture in percent or pixels
What tags insert a table?
must define beginning and end of table
What two tags are used in inserting data into the table?
defines each row in table
defines each cell in row
What does border= do when it comes to creating a table?
specifies a border for the table
What does border size 0 mean?
no border
What country was attacked (cyber warfare)?
Estonia
What are DOS attacks?
denial of service
mess up websites to where they can't be used
Whose websites were attacked in the Estonia hack?
government, banks, schools in Estonia
What are bot nets?
computers that are set up with malicious software to bombard or overload websites
Security issues aren't a matter of ___ but ___
if, when
What is computer security?
concerned with risk management, confidentiality, integrity, and the availability of electronic information that is processed and stored in a computing system
What is risk management?
the recognition, consequences, and assessment of risk to a computer system
What is Phinney's definition of risk management?
managing the risks of something happnening
What are hackers?
people who attempt to invade or disable a computer's security measures and steal their resources, disrupt computer systems
What is another word for hackers?
hacktivist
What is a hacktivist?
disrupt system of something they don't like
Why do hackers hack?
it's a challenge, sometimes money is involved
What do businesses do to take advantage of the Internet?
set up Intranets
What is the key aspect of an Intranet?
privacy
What are Intranets guarded by?
firewalls, hardware, and software that keep unauthorized users out
What are firewalls?
specialized hardware and software that work together to ensure that only authorized personnel and employees within a business can use its Intranet
What are computer viruses?
files that reproduce by making copies of themselves within a computer's memory, storage, or network
What are computer viruses also known as?
metamorphic viruses
What is the goal of experimental malware?
to combat malware, not pranks or vandalism
What are worms?
like viruses but of not need to attach itself to an existing file to spread
How do worms work?
send copies of themselves to other parts of the network without user knowledge or intervention
How do worms harm the computer system?
by slowing down system's performance, erasing files, and damaging physical hardware
How do trojan horses work?
they seem harmless and wait for a computer event (particular action or date) to spread and unleash malware
What is a proxy server?
special security computer that communications in or out of an Intranet pass through as a precaution to protect from any external threats
What is the default deny rule?
standard security practices set in that inly network connections that are permitted are the ones that have been explicitly allowed
What is the default allow rule?
all traffic is allowed unless it has been specifically blocked
What is ransomware?
disrupts things and holds you for ransom
What kind of business did Phinney say experienced ransomware?
a hospital
What happened to the hospital?
they were hacked and had to pay ransom to get data back
they were disrupted for a whole, doctors couldn't get to records
What would have happened if the hospital had a backup plan?
they wouldn't have had to pay the ransom
What is the most common way bad stuff gets into the system?
Who is the weakest link in business security?
employees
What should you assume about all emails?
all emails are guilty (bad) until proven innocent
What should you do if an email is suspicious?
forward it to the help desk
What university's employees are more educated about security and have an incredible IT staff?
TAMU
Who plays an important role in protection?
people, employees should be aware of what's going on
What is spyware?
a computer program installed covertly and secretly monitors a user's keystrokes and behavior
watches what you're doing on the computer
What is adware?
more irritating than malicious, usually installed covertly and automatically display or download advertising to a computer
What is adware's formal name?
advertising-supported software
What is spamming or junk mail?
the abuse of an email sustain to arbitrarily send typically millions on unsolicited bulk messages
What is a DOS?
denial of service attack, attempts to make a compute for any of its resources unavailable to its users
What is keylogging?
when a user sings into a computer work station where a malicious software covertly records its keystrokes
What is keylogging a part of?
spyware
What is the goal of antivirus software?
attempts to identify, prevent, and eliminate computer viruses and malware
examines computer files and matches them to known viruses stored in database
What are two of the more popular antivirus softwares?
Symantics Corporation's Norton Antivirus
McAfee's VirusScan
What are system patches?
online updates that protect their user's operating systems
Does the Cloud eliminate the need to back up files?
Cloud backs it up for you, but not everything is on the Cloud
What is a strong password?
longer in length than ordinary passwords
What is a passphrase?
a memorable strong password
What is internet fraud?
a broad term that refers to any fraudulent activity that occurs in an online setting
What is identity theft?
the crime of assuming another's identity for economic gain
What is click fraud?
a program that automatically clicks on advertising networks ads, typically randomly, for profit
fakes how many clicks on an ad you have
What are purchase scams?
simply when an unscrupulous merchant does not deliver goods or services already paid for online
What is phishing?
a legitimate looking, socially engineered email attempting to deceptively gain private information
What does the term socially engineered mean?
they know enough about you to mislead you
What is privacy?
the ability of an individual to keep their personal information out of public view
What is computer privacy?
an expectation of remaining anonymous while using a computer system or network
What are tracking cookies?
typically text files on a client computer that users are typically unaware of that keeps track of that user's information
What is data mining?
when experts extract useful information from recorded data, like a cookie
What's the difference between privacy and confidentiality?
privacy is personal info, about people
confidentiality is corporate, about company info
What's the saying to remember the difference between privacy and confidentiality?
p & c per me
What is the long definition of identity theft?
a crime concerning the unlawful practice of assuming another individual's identity