IC3: Fourth Quarter

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/27

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

28 Terms

1
New cards

Cyber Security

the security offered through on-line services to protect your online information

2
New cards

Data Breach

the intentional or unintentional release of secure or private/confidential information to an untrusted environment

3
New cards

Attack Surface

the sum of the different points where an unauthorized user can try to enter data to or extract data from an environment

4
New cards

Hackers

person who breaks into computers, usually by gaining access to administrative controls

5
New cards

Black Hat

  • stereotypical hacker

  • motives are financial gain

  • aims to break into your accounts and steal bank details and other confidential data

6
New cards

White Hat

  • desires to help businesses and protect them against cyber threats

7
New cards

Certified Ethical Hacker (CEH)

qualification given to white hackers from the EC Council

8
New cards

Grey Hat

motives are just for personal enjoyment, they make up most of the hacking community

9
New cards

Virus

  • malicious program designed to take control of system and destroy data

  • loaded onto your computer without your consent

  • human made and designed to spread to other computer users through networks and e-mails

10
New cards

Trojan

  • program designed to allow remote access to a computer system

  • seemingly harmless and hidden in an application

  • installed on the target system when the user opens the application

  • does not replicate itself like virus and worms

11
New cards

Malware

any malicious program that causes harm to a computer system or network

12
New cards

Worms

  • self-replicating programs that consumes systems

  • has ability to spread without end-user action (unlike viruses)

13
New cards

Adware

  • automatically displays or downloads advertisements

14
New cards

Spyware

  • secretly placed on your system and gathers personal or private information without your consent or knowledge

15
New cards

Cybercrime

criminal activity that either targets or uses a computer, a computer network or a networked device

16
New cards

Cryptocurrency

digital currency that can be used to buy goods and services

17
New cards

Bitcoin

the most recognizable and the most closely associated with the cryptocurrency system

18
New cards

Cyberextortion

demanding money to prevent a threatened attack

19
New cards

Cyberespionage

where hackers access government or company data

20
New cards

Phishing

is the fraudulent attempt to obtain sensitive information by impersonating oneself as a trustworthy entity in digital communication

21
New cards

Cookies

small text files that contain information pertaining to web site activity

22
New cards

Firewall

a security barrier that filters and controls the flow of information coming into and out of a private network

23
New cards

Social Engineering

is the practice of tricking users into giving out passwords or other types of access information

24
New cards

Baiting

involves creating a trap, such as a USB stick loaded with malware

25
New cards

Pretexting

uses a pretext to gain attention and hook the victim into providing information

26
New cards

Backup

a duplicate copy of a program, a disk, or data, made either for archiving purposes or for safeguarding files from loss if the active copy is damaged or destroyed

27
New cards

Windows Back Up and Restore

feature from Windows 7 that configures Windows to automatically create a weekly backup of all important files on the computer

Windows runs a backup every Sunday at 7PM

28
New cards

File History in Windows 10

configures Windows 10 to automatically create an hourly backup of your personal files whenever the destination media is connected to the PC