Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Term

SPAM:
click to flip
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't know

Term

Cookie types:
Remaining cards (32)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CIW Cert Lesson 8

CIW

TermDefinition
SPAM: avoiding
Cookie types: o persistent o session o first-party o third-party o control when whom cookies are accepted by specifying the level of privacy you want to maintain o view the file content of cookies to see information about the Web site that sent them to you
You can configure your browser’s security settings to accept, reject or prompt before accepting: o ActiveX controls o JavaScript
Authentication the process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data
Anonymous logon: no user name or password are required, and authentication is handled transparently by the browser and server
Basic authentication: a user name and password are required, and that information is sent as plain text
Symmetric (private-key) encryption: The same key is used to encrypt and decrypt messages
Asymmetric (public-key) encryption: Two keys are used to encrypt and decrypt messages: a public key and a private key
Hash (one-way) encryption: Uses hashes to verify the integrity of transmitted messages
Digital certificates: you must have the proper digital certificate to gain access
User names and passwords: used to log on to private and public networks, including the Internet
Digital signatures: electronic signatures that verify the identity of the message sender
Non-repudiation: digital signatures prove that a transaction or transmission took place; neither the sender nor the receiver can later deny the action
Encryption: the process of converting data into an unreadable form of text
Decryption: the process of converting the encrypted data back to its original form
Key: a mathematical algorithm
Secure Sockets Layer (SSL): a protocol for secure exchanges
Virus: damages computers and networks, often alters files to damage or destroy data
Worm: resides in active memory and replicates itself until an entire disk is full
Trojan: appears to be harmless (such as a computer game) but produces harmful results
Illicit server: installs hidden services on systems
Client code: allows remote access to a computer by an attacker
Server code: infects destination computer and enables the attacker to control it
Common ways to contract viruses:  Receive infected disc/drive from colleague or friend  Download infected file  Download illicit server attachment  Copy to your hard disk a document infected with a macro virus
If you receive an attachment you do not recognize: o Do not open the attachment o Contact the sender to determine whether the attachment is legitimate o If you cannot contact the sender, delete the attachment from the message o Delete the attachment from the Deleted Items folder
If you suspect a virus attack: o Use anti-virus software to remove the virus o If you cant launch anti-virus software, reboot from a known clean system disk, launch anti-virus software o Remove virus from all disks/file/programs o If damage is too extensive, reformat hard disk,
Spyware an application secretly placed on a user’s system to covertly gather information and relay it to outside parties, usually for advertising purposes
Cookies are not spyware because:  The user is aware of their presence  The user has the option to disable outside access to cookie information  Use spyware detection applications to detect and eliminate spyware
Update: a software upgrade that permanently fixes known bugs and improves software performance
Patch: a temporary bug fix
Virus update: files of virus signature profiles you use to keep your anti-virus software current
Typosquatting: registering a domain name similar to a high-volume site hoping to receive traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in the browser
Firewall: a collection of hardware, software and corporate policies that prevents unauthorized access to or from private networks
Created by: hannahluvsu
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards