1/21
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Data Harvesters
Cybercriminals who infiltrate systems and collect data for illegal resale
Whitelists
Permit communication only with approved entities or in an approved manner.
What layers that our slides show the monitoring & prevention answer?
Internet, networks, & systems and people.
Three types of servers we would find in a company's architecture?
Database server, application server, & web server.
Application Server
Software that houses business logic for use (and reuse) by multiple applications.
Database Server
Software that manages database management software and provides for access and storage of data.
Web Services
Small pieces of code that are accessed via the application server that permit interoperable machine-to-machine interaction over a network.
Application Programming Interface (API)
Programming hooks, or guidelines, published by firms that tell other programs how to get a service to perform a task such as send or receive data.
Service-Oriented Architecture (SOA)
Set of Web services built around an organization's processes and procedures.
Internet Service Provider (ISP)
Organization or firm that provides access to the internet.
Web hosting services
A firm that provides hardware and servers to run the websites of others.
Operating Systems (OS)
Software that controls computer hardware and allows users and programs to interact with the computer. (Ex. Samsung is a type of this)
hypertext transfer protocol (http)
Application transfer protocol that allows Web browsers and Web servers to communicate with each other.
Domain name service (DNS)
Internet directory service that allows devices and services to be named and discoverable.
Extensible markup language (XML)
A tagging language that can be used to identify data fields made available for use by other applications. Most APIs and Web services send messages where the data exchanged is wrapped in identifying ____ tags.
Hypertext markup language (HTML)
Language used to compose Web pages.
distributed computing
A form of computing where systems in different locations communicate and collaborate to complete a task.
Trolls
People that hack just for the fun of it and malicious pranksters.
Blended threats
Attacks combining multiple malware or hacking exploits.
Ransomware attacks
Criminals infiltrate networks and encrypt an organization's data.
• Hold data assets hostage and irrecoverable unless the organization forks over a ransom in untraceable crypto to receive the decryption key.
• Many ____ hackers are moving from locking up data to simply threatening its release unless they receive a crypto-payment.
• Hackers no long just encrypt data; they encrypt it first. If the ransom isn't paid, they threaten to leak sensitive IP.
Stuxnet
A highly sophisticated computer worm and one of the most well-known examples of cyberwarfare.
Botnets
Also known as zombie networks: Used in click fraud, sending spam, executing "dictionary" password cracking attempts, and to decipher accounts that use CAPTCHAs: Scrambled character images to thwart automated account setup or ticket buying attempts.