Term
click below
click below
Term
Normal Size Small Size show me how
CIW Cert Lesson 8
CIW
Term | Definition |
---|---|
SPAM: | avoiding |
Cookie types: | o persistent o session o first-party o third-party o control when whom cookies are accepted by specifying the level of privacy you want to maintain o view the file content of cookies to see information about the Web site that sent them to you |
You can configure your browser’s security settings to accept, reject or prompt before accepting: | o ActiveX controls o JavaScript |
Authentication | the process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data |
Anonymous logon: | no user name or password are required, and authentication is handled transparently by the browser and server |
Basic authentication: | a user name and password are required, and that information is sent as plain text |
Symmetric (private-key) encryption: | The same key is used to encrypt and decrypt messages |
Asymmetric (public-key) encryption: | Two keys are used to encrypt and decrypt messages: a public key and a private key |
Hash (one-way) encryption: | Uses hashes to verify the integrity of transmitted messages |
Digital certificates: | you must have the proper digital certificate to gain access |
User names and passwords: | used to log on to private and public networks, including the Internet |
Digital signatures: | electronic signatures that verify the identity of the message sender |
Non-repudiation: | digital signatures prove that a transaction or transmission took place; neither the sender nor the receiver can later deny the action |
Encryption: | the process of converting data into an unreadable form of text |
Decryption: | the process of converting the encrypted data back to its original form |
Key: | a mathematical algorithm |
Secure Sockets Layer (SSL): | a protocol for secure exchanges |
Virus: | damages computers and networks, often alters files to damage or destroy data |
Worm: | resides in active memory and replicates itself until an entire disk is full |
Trojan: | appears to be harmless (such as a computer game) but produces harmful results |
Illicit server: | installs hidden services on systems |
Client code: | allows remote access to a computer by an attacker |
Server code: | infects destination computer and enables the attacker to control it |
Common ways to contract viruses: | Receive infected disc/drive from colleague or friend Download infected file Download illicit server attachment Copy to your hard disk a document infected with a macro virus |
If you receive an attachment you do not recognize: | o Do not open the attachment o Contact the sender to determine whether the attachment is legitimate o If you cannot contact the sender, delete the attachment from the message o Delete the attachment from the Deleted Items folder |
If you suspect a virus attack: | o Use anti-virus software to remove the virus o If you cant launch anti-virus software, reboot from a known clean system disk, launch anti-virus software o Remove virus from all disks/file/programs o If damage is too extensive, reformat hard disk, |
Spyware | an application secretly placed on a user’s system to covertly gather information and relay it to outside parties, usually for advertising purposes |
Cookies are not spyware because: | The user is aware of their presence The user has the option to disable outside access to cookie information Use spyware detection applications to detect and eliminate spyware |
Update: | a software upgrade that permanently fixes known bugs and improves software performance |
Patch: | a temporary bug fix |
Virus update: | files of virus signature profiles you use to keep your anti-virus software current |
Typosquatting: | registering a domain name similar to a high-volume site hoping to receive traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in the browser |
Firewall: | a collection of hardware, software and corporate policies that prevents unauthorized access to or from private networks |