J277 Section 4 Network Security and Systems Software

studied byStudied by 1 person
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 37

38 Terms

1

Malware

Malicious software designed to harm, exploit, or otherwise compromise a computer system, network, or device. It includes viruses, worms, trojans, and ransomware.

New cards
2

Virus

A type of malware that replicates itself by infecting other files or programs, often causing damage or disruption to the system.

New cards
3

Worm

A self-replicating type of malware that spreads across networks by exploiting vulnerabilities in software, often consuming bandwidth and causing disruption.

New cards
4

Trojan

A type of malware that disguises itself as legitimate software to trick users into installing it, allowing unauthorized access to the system.

New cards
5

Social Engineering

A manipulation technique that exploits human psychology to trick individuals into revealing confidential information or performing actions that compromise security.

New cards
6

Phishing

A form of social engineering that uses deceptive emails or websites to trick individuals into providing sensitive information, such as passwords or credit card numbers.

New cards
7

Human Error

The accidental actions or mistakes made by individuals that can lead to security breaches or vulnerabilities in a system.

New cards
8

Blagging

A form of social engineering where an attacker deceives a target by pretending to be someone they trust, often to gain access to sensitive information or resources.

New cards
9

Security Training

Programs designed to educate employees about security policies, procedures, and best practices to protect sensitive information and prevent security breaches.

New cards
10

Brute Force Attack

A method used by attackers to gain unauthorized access to systems by systematically trying all possible combinations of passwords or encryption keys until the correct one is found.

New cards
11

Denial of Service Attack

A malicious attempt to disrupt the normal functioning of a targeted server, service, or network by overwhelming it with a flood of traffic, rendering it unavailable to users.

New cards
12

Distributed Denial of Service Attack

A type of denial of service attack where multiple compromised systems are used to flood the target with traffic, making it difficult for legitimate users to access the service.

New cards
13

Shouldering

A technique used by attackers to obtain sensitive information such as passwords or PINs by observing a user's actions, often in public places.

New cards
14

Man-in-the-middle attack

A security breach where an attacker intercepts and alters communication between two parties without their knowledge, allowing them to eavesdrop or manipulate the data being transmitted.

New cards
15

Physical Security

Measures designed to protect physical assets from unauthorized access, damage, or theft. This includes locks, surveillance cameras, and access control systems.

New cards
16

SQL Injection

A code injection technique that exploits vulnerabilities in an application's software by inserting malicious SQL statements into input fields, allowing attackers to access or manipulate a database.

New cards
17

Penetration testing

A simulated cyber attack against a computer system, network, or web application to identify security vulnerabilities that could be exploited by attackers.

New cards
18

Anti-malware software

Programs designed to detect, prevent, and remove malicious software from computers and networks, protecting against viruses, spyware, and other threats.

New cards
19

Firewall

A network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules, acting as a barrier between a trusted internal network and untrusted external networks.

New cards
20

Password protection

A security measure that restricts access to a system or data by requiring a user to enter a secret combination of characters, ensuring only authorized users can gain entry.

New cards
21

User Access Levels

Different permissions granted to users based on their roles, determining what data and functions they can access within a system.

New cards
22

Encryption

The process of converting data into a coded format to prevent unauthorized access, ensuring that only authorized parties can read or process the information.

New cards
23

Operating System

The software that manages computer hardware and software resources, providing essential services for application programs and acting as an interface between the user and the hardware.

New cards
24

System Software

Software designed to provide a platform for running application software, managing hardware, and facilitating system functions. Includes the operating system and utility software.

New cards
25

Functions of an OS

The various tasks performed by an operating system, including managing hardware resources, providing user interfaces, and ensuring efficient operation of application software. Also includes file management, memory management, peripheral management, user management.

New cards
26

GUI

A graphical user interface that allows users to interact with electronic devices through visual indicators and graphical elements.

New cards
27

WIMP

An acronym for Windows, Icons, Menus, and Pointing device, representing a style of user interface that allows users to interact with a computer using these elements.

New cards
28

Command Line Interface

A text-based user interface that allows users to interact with the operating system or software by typing commands into a console or terminal. Harder to learn but uses fewer resources and faster for an experienced user. It provides direct control over the system and is often used for scripting and automation.

New cards
29

Memory Management

The process of controlling and coordinating computer memory, including allocation, tracking, and deallocation of memory space to ensure efficient use of resources and optimal system performance.

New cards
30

File management

The administration of files on a computer system, including the creation, organization, storage, retrieval, and deletion of files to ensure efficient data handling and accessibility.

New cards
31

Peripheral management

The administration and control of peripheral devices connected to a computer system, including their configuration, monitoring, and troubleshooting to ensure proper functionality and performance.

New cards
32

Buffering

The process of temporarily storing data in a buffer to accommodate differences in data processing rates between devices or applications, enhancing performance and preventing data loss.

New cards
33

User Management

The administration of user accounts and permissions on a computer system, including creating, modifying, and deleting user profiles to ensure security and access control.

New cards
34

Utility Software

Software designed to help manage, maintain, and control computer resources, including tools for system diagnostics, file management, and performance optimization.

New cards
35

Encryption software

Programs that protect data by converting it into a coded format, ensuring that only authorized users can access the information.

New cards
36

Defragmentation

The process of reorganizing fragmented data on a hard drive to improve performance and access speed by placing related data closer together and empty space together at the end of the disk.

New cards
37

Compression Software

Programs that reduce the size of files for storage efficiency and faster transmission, often by removing redundant data.

New cards
38
New cards
robot