________- contains all the web pages and content that will be published on the web.
2
New cards
Software
________ that replicates and infects many computers, turning the computer into a "zombie.
3
New cards
Spyware
________- Software that secretly collects information about you.
4
New cards
Whistleblower
________- An "insider, "meaning an employee of an organization, exposes an injustice or some criminal behavior that the organization is committing.
5
New cards
Breaches
________ are made by word of mouth, printing, and emailing.
6
New cards
Decrypt
________- Decodes information and is the opposite of encrypted.
7
New cards
Backdoor
________- Malicious software that bypasses the normal, secure, or restricted access.
8
New cards
Social Engineering
________- The art of manipulating people so they give up confidential information, which.
9
New cards
Admins
________ can enable or disable directory browsing, such as FTP.
10
New cards
Spam
________- Irrelevant or inappropriate messaging sent through email to a large number of recipients; also known as junk mail.
11
New cards
Passive Analysis
________- Analyze something without interfering or affecting it.
12
New cards
White Hat Hacker
________- Expert who has permission to perform security tests and who fully discloses their activities.
13
New cards
Ecommerce
________- The buying and selling of goods or services over the internet.
14
New cards
Ransomware
________ can spread like a virus, worm, or Trojan horse.
15
New cards
Security Baseline
________- A starting point for data analysis.
16
New cards
CAPTCHA
________- A system that can distinguish between a human and an automated program.
17
New cards
Industrial Espionage
________- Companies steal information from competitors to gain the upper hand or eliminate the competition.
18
New cards
URL
Typosquatting- Also known as ________ hijacking, is a form of cybersquatting (sitting on sites under someone else's brand or copyright) that targets Internet users who incorrectly type a website address into their web browser.
19
New cards
Cookie
________- Small text- based bits of information about your browser that a web server saves.
20
New cards
Packet
________- Small units of data transmitted on a network.
21
New cards
IIS
The behavior and structure of the websites run by ________ and supports secure site configurations.
22
New cards
Protocol
________- Agreed method of communication.
23
New cards
Top Level Domain
________- The last segment of a web address; it follows immediately after the last "dot "symbol (.com, .net, .org, .gov)
24
New cards
Encrypt
________- to write in code; to encode.
25
New cards
personal gain
Their behavior is meant to cause harm, to draw attention to something, or to achieve ________.
26
New cards
Web Server
________- A computer that delivers files forming web pages across a network to requesting clients.
27
New cards
Log File
________- A file that contains an official record of activities that occur on a computer.
28
New cards
Social Ideology
________- Hackers engage in "hacktivism "to change aspects of society such as disrupting.
29
New cards
Penetration Testing
________ (Pen Test)- Performing a computer attack to evaluate the security of a system.
30
New cards
Trojan Horse
________- A malicious program disguised as legitimate software.
31
New cards
IP Address
________- An identifying number for hosts and servers on the internet.
32
New cards
Information Architecture
________- The way an organization structures and structures and organizes the information that is required by their employees and /or customers.
33
New cards
Internet Protocol
It uses the ________ (IP) and is of the form nnn.nnn.nnn.nnn.
34
New cards
IIS Manager
________- Administration tool for the MS IIS web server.
35
New cards
Host Machine
________- A computer, typically one on a network.
36
New cards
Zombie devices
________ are remotely controlled by an attacker for malicious purposes.
37
New cards
Worms
________- Similar to a virus except that a(n) ________ does not need a human to spread, rather it can replicate on its own to infect other computers.
38
New cards
Log File protection measures
________ using IIS Manager- Change the file location to make it harder to find.
39
New cards
Ransomware
________- Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it.
40
New cards
Software
________ and hardware that track all keyboard clicks, including back spaces, to discover usernames, passwords, credit card numbers, and other sensitive information.
41
New cards
Log Files
________- A file that keeps records of events that occur on a computer.
42
New cards
CAPTCHA
A system that can distinguish between a human and an automated program
43
New cards
Trojan Horse
A malicious program disguised as legitimate software
44
New cards
Difference between worm and virus
A worm is spread on it's own and does not need human interaction, a virus is spread through humans and needs them to spread
45
New cards
Worms
Similar to a virus except that a worm does not need a human to spread, rather it can replicate on its own to infect other computers
46
New cards
Phishing
Practice of sending fraudulent emails that appear to be from legitimate
47
New cards
Spam
Irrelevant or inappropriate messaging sent through email to a large number of recipients; also known as junk mail
48
New cards
Top-Level Domain
The last segment of a web address; it follows immediately after the last "dot" symbol (.com, .net, .org, .gov)
49
New cards
Social Engineering
The art of manipulating people so they give up confidential information, which
50
New cards
Log Files
A file that keeps records of events that occur on a computer
51
New cards
Site Certificate
A small data file that is validated by a "certificate authority" which allows an organization have a secure website
52
New cards
Cookie
Small text-based bits of information about your browser that a web server saves
53
New cards
Spyware
Software that secretly collects information about you
54
New cards
Typosquatting
Also known as URL hijacking, is a form of cybersquatting (sitting on sites under someone else's brand or copyright) that targets Internet users who incorrectly type a website address into their web browser
55
New cards
Backdoor
Malicious software that bypasses the normal, secure, or restricted access
56
New cards
Script Files
Disguising executable files as other file types, tricking a user into executing a script (1.2.2 bubble 15)
57
New cards
Ransomware
Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it
58
New cards
Ecommerce
The buying and selling of goods or services over the internet
59
New cards
Protocol
Agreed method of communication
60
New cards
Host Machine
A computer, typically one on a network
61
New cards
Web Server
A computer that delivers files forming web pages across a network to requesting clients
62
New cards
Information Architecture
The way an organization structures and structures and organizes the information that is required by their employees and/or customers
63
New cards
Passive Analysis
Analyze something without interfering or affecting it
64
New cards
IP Address
An identifying number for hosts and servers on the internet
65
New cards
This appears after a colon at the end of the address nnn.nnn.nnn.nnn
nnn
66
New cards
Security Baseline
A starting point for data analysis
67
New cards
What does netstat
n do
68
New cards
- Without the "-n" it converts IP address to domain names, to see just the IP addresses use the -n flag (also runs faster)
shows all remote (foreign) hosts that are currently exchanging data with your host
69
New cards
Whistleblower
An "insider", meaning an employee of an organization, exposes an injustice or some criminal behavior that the organization is committing
70
New cards
Social Ideology
Hackers engage in "hacktivism" to change aspects of society such as disrupting
71
New cards
Black Hat Hacker
Hacker who breaks laws, steals data, holds information for ransom, and commits other criminal acts
72
New cards
White Hat Hacker
Expert who has permission to perform security tests and who fully discloses their activities
73
New cards
Grey hat hacker
Hacker uses illegal and/or unethical means to discover a system's security vulnerabilities
74
New cards
Industrial Espionage
Companies steal information from competitors to gain the upper hand or eliminate the competition
75
New cards
Packet
Small units of data transmitted on a network
76
New cards
Decrypt
Decodes information and is the opposite of encrypted
77
New cards
Encrypt
to write in code; to encode
78
New cards
Penetration Testing (Pen Test)
Performing a computer attack to evaluate the security of a system
79
New cards
Log File
A file that contains an official record of activities that occur on a computer
80
New cards
Inetpub
contains all the web pages and content that will be published on the web
81
New cards
IIS Manager
Administration tool for the MS IIS web server
82
New cards
Log File protection measures using IIS Manager
Change the file location to make it harder to find
83
New cards
FTP protection measures using IIS Manager
You use the remove services tool in the IIS manager to remove FTP functions
84
New cards
Directory Browsing
You use the IIS manager to go to directory and then you disable directory browsing