J277 Section 4 Network Security and Systems Software

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/37

Anonymous user
Anonymous user
Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards

Malware

Malicious software designed to harm, exploit, or otherwise compromise a computer system, network, or device. It includes viruses, worms, trojans, and ransomware.

2
New cards

Virus

A type of malware that replicates itself by infecting other files or programs, often causing damage or disruption to the system.

3
New cards

Worm

A self-replicating type of malware that spreads across networks by exploiting vulnerabilities in software, often consuming bandwidth and causing disruption.

4
New cards

Trojan

A type of malware that disguises itself as legitimate software to trick users into installing it, allowing unauthorized access to the system.

5
New cards

Social Engineering

A manipulation technique that exploits human psychology to trick individuals into revealing confidential information or performing actions that compromise security.

6
New cards

Phishing

A form of social engineering that uses deceptive emails or websites to trick individuals into providing sensitive information, such as passwords or credit card numbers.

7
New cards

Human Error

The accidental actions or mistakes made by individuals that can lead to security breaches or vulnerabilities in a system.

8
New cards

Blagging

A form of social engineering where an attacker deceives a target by pretending to be someone they trust, often to gain access to sensitive information or resources.

9
New cards

Security Training

Programs designed to educate employees about security policies, procedures, and best practices to protect sensitive information and prevent security breaches.

10
New cards

Brute Force Attack

A method used by attackers to gain unauthorized access to systems by systematically trying all possible combinations of passwords or encryption keys until the correct one is found.

11
New cards

Denial of Service Attack

A malicious attempt to disrupt the normal functioning of a targeted server, service, or network by overwhelming it with a flood of traffic, rendering it unavailable to users.

12
New cards

Distributed Denial of Service Attack

A type of denial of service attack where multiple compromised systems are used to flood the target with traffic, making it difficult for legitimate users to access the service.

13
New cards

Shouldering

A technique used by attackers to obtain sensitive information such as passwords or PINs by observing a user's actions, often in public places.

14
New cards

Man-in-the-middle attack

A security breach where an attacker intercepts and alters communication between two parties without their knowledge, allowing them to eavesdrop or manipulate the data being transmitted.

15
New cards

Physical Security

Measures designed to protect physical assets from unauthorized access, damage, or theft. This includes locks, surveillance cameras, and access control systems.

16
New cards

SQL Injection

A code injection technique that exploits vulnerabilities in an application's software by inserting malicious SQL statements into input fields, allowing attackers to access or manipulate a database.

17
New cards

Penetration testing

A simulated cyber attack against a computer system, network, or web application to identify security vulnerabilities that could be exploited by attackers.

18
New cards

Anti-malware software

Programs designed to detect, prevent, and remove malicious software from computers and networks, protecting against viruses, spyware, and other threats.

19
New cards

Firewall

A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules, acting as a barrier between a trusted internal network and untrusted external networks.

20
New cards

Password protection

A security measure that restricts access to a system or data by requiring a user to enter a secret combination of characters, ensuring only authorized users can gain entry.

21
New cards

User Access Levels

Different permissions granted to users based on their roles, determining what data and functions they can access within a system.

22
New cards

Encryption

The process of converting data into a coded format to prevent unauthorized access, ensuring that only authorized parties can read or process the information.

23
New cards

Operating System

The software that manages computer hardware and software resources, providing essential services for application programs and acting as an interface between the user and the hardware.

24
New cards

System Software

Software designed to provide a platform for running application software, managing hardware, and facilitating system functions. Includes the operating system and utility software.

25
New cards

Functions of an OS

The various tasks performed by an operating system, including managing hardware resources, providing user interfaces, and ensuring efficient operation of application software. Also includes file management, memory management, peripheral management, user management.

26
New cards

GUI

A graphical user interface that allows users to interact with electronic devices through visual indicators and graphical elements.

27
New cards

WIMP

An acronym for Windows, Icons, Menus, and Pointing device, representing a style of user interface that allows users to interact with a computer using these elements.

28
New cards

Command Line Interface

A text-based user interface that allows users to interact with the operating system or software by typing commands into a console or terminal. Harder to learn but uses fewer resources and faster for an experienced user. It provides direct control over the system and is often used for scripting and automation.

29
New cards

Memory Management

The process of controlling and coordinating computer memory, including allocation, tracking, and deallocation of memory space to ensure efficient use of resources and optimal system performance.

30
New cards

File management

The administration of files on a computer system, including the creation, organization, storage, retrieval, and deletion of files to ensure efficient data handling and accessibility.

31
New cards

Peripheral management

The administration and control of peripheral devices connected to a computer system, including their configuration, monitoring, and troubleshooting to ensure proper functionality and performance.

32
New cards

Buffering

The process of temporarily storing data in a buffer to accommodate differences in data processing rates between devices or applications, enhancing performance and preventing data loss.

33
New cards

User Management

The administration of user accounts and permissions on a computer system, including creating, modifying, and deleting user profiles to ensure security and access control.

34
New cards

Utility Software

Software designed to help manage, maintain, and control computer resources, including tools for system diagnostics, file management, and performance optimization.

35
New cards

Encryption software

Programs that protect data by converting it into a coded format, ensuring that only authorized users can access the information.

36
New cards

Defragmentation

The process of reorganizing fragmented data on a hard drive to improve performance and access speed by placing related data closer together and empty space together at the end of the disk.

37
New cards

Compression Software

Programs that reduce the size of files for storage efficiency and faster transmission, often by removing redundant data.

38
New cards