IC3: Fourth Quarter

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Cyber Security

1 / 27

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

28 Terms

1

Cyber Security

the security offered through on-line services to protect your online information

New cards
2

Data Breach

the intentional or unintentional release of secure or private/confidential information to an untrusted environment

New cards
3

Attack Surface

the sum of the different points where an unauthorized user can try to enter data to or extract data from an environment

New cards
4

Hackers

person who breaks into computers, usually by gaining access to administrative controls

New cards
5

Black Hat

  • stereotypical hacker

  • motives are financial gain

  • aims to break into your accounts and steal bank details and other confidential data

New cards
6

White Hat

  • desires to help businesses and protect them against cyber threats

New cards
7

Certified Ethical Hacker (CEH)

qualification given to white hackers from the EC Council

New cards
8

Grey Hat

motives are just for personal enjoyment, they make up most of the hacking community

New cards
9

Virus

  • malicious program designed to take control of system and destroy data

  • loaded onto your computer without your consent

  • human made and designed to spread to other computer users through networks and e-mails

New cards
10

Trojan

  • program designed to allow remote access to a computer system

  • seemingly harmless and hidden in an application

  • installed on the target system when the user opens the application

  • does not replicate itself like virus and worms

New cards
11

Malware

any malicious program that causes harm to a computer system or network

New cards
12

Worms

  • self-replicating programs that consumes systems

  • has ability to spread without end-user action (unlike viruses)

New cards
13

Adware

  • automatically displays or downloads advertisements

New cards
14

Spyware

  • secretly placed on your system and gathers personal or private information without your consent or knowledge

New cards
15

Cybercrime

criminal activity that either targets or uses a computer, a computer network or a networked device

New cards
16

Cryptocurrency

digital currency that can be used to buy goods and services

New cards
17

Bitcoin

the most recognizable and the most closely associated with the cryptocurrency system

New cards
18

Cyberextortion

demanding money to prevent a threatened attack

New cards
19

Cyberespionage

where hackers access government or company data

New cards
20

Phishing

is the fraudulent attempt to obtain sensitive information by impersonating oneself as a trustworthy entity in digital communication

New cards
21

Cookies

small text files that contain information pertaining to web site activity

New cards
22

Firewall

a security barrier that filters and controls the flow of information coming into and out of a private network

New cards
23

Social Engineering

is the practice of tricking users into giving out passwords or other types of access information

New cards
24

Baiting

involves creating a trap, such as a USB stick loaded with malware

New cards
25

Pretexting

uses a pretext to gain attention and hook the victim into providing information

New cards
26

Backup

a duplicate copy of a program, a disk, or data, made either for archiving purposes or for safeguarding files from loss if the active copy is damaged or destroyed

New cards
27

Windows Back Up and Restore

feature from Windows 7 that configures Windows to automatically create a weekly backup of all important files on the computer

Windows runs a backup every Sunday at 7PM

New cards
28

File History in Windows 10

configures Windows 10 to automatically create an hourly backup of your personal files whenever the destination media is connected to the PC

New cards

Explore top notes

note Note
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 151 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 298 people
Updated ... ago
5.0 Stars(9)
note Note
studied byStudied by 347 people
Updated ... ago
5.0 Stars(5)
note Note
studied byStudied by 6 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 79 people
Updated ... ago
5.0 Stars(3)

Explore top flashcards

flashcards Flashcard50 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard57 terms
studied byStudied by 22 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard34 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard204 terms
studied byStudied by 7 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard799 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard40 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard46 terms
studied byStudied by 79 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard39 terms
studied byStudied by 46 people
Updated ... ago
5.0 Stars(2)