• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back
War Dialing
Computer automatically dials phone numbers looking for modems.
Denial-of-Service Attack
Constant stream of requests made to a Web-server (usually via a Botnet) that overwhelms and shuts down service.
Dictionary Attack
Spammers use special software to guess addresses at a company and send blank e-mail messages. Messages not returned usually have valid e-mail addresses and are added to spammer e-mail lists.
Data Diddling
Making changes to data before, during, or after it is entered into a system.
Zero-day attack
An attack between the time a new software vulnerability is discovered and the time a software developer releases a patch that fixes the problem.
Social Engineering
Techniques, usually psychological tricks, to gain access to sensitive data or information. Used to gain access to secure systems or locations.
Virus
A segment of executable code that attaches itself to an application program or some other executable system component. When the hidden program is triggered, it makes unauthorized alterations to the way a system operates.
Worm
Similar to a virus, except that it is a program rather than a code segment hidden in a host program. A worm also copies itself automatically and actively transmits itself directly to other systems.
Identity Theft
Assuming someone else's identity.
Posing
Using a fake business to acquire sensitive information.
Piggybacking
When a perpetrator latches onto a user who is logging in to a system. The legitimate user unknowingly carries the perpetrator with him into the system.
Malware
Any software which can be used to do harm.
Data Leakage
Unauthorized copying of company data.