K201 FINAL
Terms
undefined, object
copy deck
-
_____ is a method for confirming users' identities.
-
Authentication
- A(n)_____ is hardware and/or software that guards a private network by analyzing the information leaving and entering the network.
-
Firewall
- _____ hate hackers work at the request of the system owners to find system vulnerabilities and plug the holes.
- White
- Trojan-horse virus hides inside other ____, usually as an attachment or a downloadable file.
- Software
- The ____ of Death is a common type of DDoS and occurs when thousands of computers try to access a Web site at the same time, overloading it and shutting it down.
- Ping
- Spoofing is the forging of the ____ address on an e-mail so teat the e-mail message appears to come from someone other than the actual sender.
- Return
- Malicious code includes a variety of threats such as ____, worms, and Trojan horses.
- Viruses
-
Distributed denial-of-service attack (DDoS) attack from multiple ____ that flood a Web site with so many request for service that it slows down or crashes.
- Computers
-
Denial-of-service attach (DoS) ____ a Web site with so many requests for service that it slows down or crashes the site.
-
Floods
-
A(n) ____ software written with malicious intent to cause annoyance or damage.
- Virus
- ____ are people very knowledgeable about computers who use their knowledge to invade other people's computers.
- Hackers
- ____ have philosophical and political reasons for breaking into systems and will often deface the Web site as a protest.
- Hactivists
- ____ is a hacker with criminal intent.
- Cracker
- ____ hate hackers break into other people's computer systems and may just look around or may steal and destroy information.
- Black
- ____ attack computer systems by transmitting a virus hoax, with a real virus attached.
- Hoaxes
-
____ seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.
- Cyberterrorist
- ____ programs are viruses that open a way into the network for future attacks.
- Backdoor
- A(n)____ is a program or device that can monitor data traveling over a network.
- Sniffer
- A(n)____ is a type of virus that spreads itself, not only from file to file, but also from computer to computer.
- Worm
- ePolicies are policies and procedures that address the ethical use of computers and Internet usage in the ____ environment.
- Business
-
____ is the legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents.
- Copywright
- ____ are the principles and standards that guide our behavior toward other people.
- Ethics
- The ____ communications privacy act allows the reading of communications by a firm and says that employees have no right to privacy when using their companies' computers.
- Electronic
- The ____ bill prohibits the use of video rental information on customers for an purpose other than that of marketing goods and services directly to the customer.
- Bork
- The ___ act restricts what information the federal government can collect.
- Privacy
- A(n) ____ computer use policy contains general principles to guide computer user behavior.
- Nonrepudiation
- ____ is a contractual stipulation to ensure that e-business participants do no deny their online actions.
- Opt-in
- ____ implies that contact will be made with only the people who had agreed to receive promotions and marketing materials.
- Freedom
- The ____ of information act allows and person to examine government records unless it would cause an invasion of privacy.
- Acceptable
- A(n) ____ use policy is a policy that a user must agree to follow in order to be provided access to a network or to the Internet.
- Internet
- A(n) ____ privacy policy details the extent to which e-mail messages may be read by others.
- ____ is software that comes hidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user know nothing about.
- Spyware
- ____ is software to generate ads that installs inself on a computer when a person downloads some other program from the Internet.
- Adware
- Key logger or key trapper software is a ____ that when installed on a computer, records every keystroke and mouse click.
- Program