Computer Analysis Chpt 10

Vocab

42 cards   |   Total Attempts: 182
  

Related Topics

Cards In This Set

Front Back
Any event or action that could cause a loss of or damage to computer hardware, software, data, info or processing capability
Computer security risk
An online or internet based illegal act
Cybercrime
Website that evaluates your computer to check for internet and e-mail vulnerabilities 
Online security service
Affects a computer negatively by altering the way the computer works
Computer virus
Copies itself repeatedly using up resources and possibly shutting down the computer or network
Worm
A malicious program that hides w/in or looks like a legitimate program
Trojan horse
Program that hides in a computer and allows someone from a remote location to take full control
Rootkit
Group of compromised computers connected to a network
Botnet
Compromised computer
Zombie
Disrupts computer access to internet services
Denial of service attack (DoS attack)
A program or set of instructions in a program that allow users to bypass security controls 
Back door
 a technique intruders use to make their network or internet transmission appear legitimate 
Spoofing 
Hardware and/or software that protects a networks resources from intrusion 
Firewall
Vulnerable computer that is set up to entice an intruder to break into it
Honeypot 
The use of a computer or network w/o permission 
Unauthorized access