click below
click below
Normal Size Small Size show me how
CIW Cert Lesson 8
CIW
| Term | Definition |
|---|---|
| SPAM: | avoiding |
| Cookie types: | o persistent o session o first-party o third-party o control when whom cookies are accepted by specifying the level of privacy you want to maintain o view the file content of cookies to see information about the Web site that sent them to you |
| You can configure your browser’s security settings to accept, reject or prompt before accepting: | o ActiveX controls o JavaScript |
| Authentication | the process of verifying the identity of a user who logs on to a system, or the integrity of transmitted data |
| Anonymous logon: | no user name or password are required, and authentication is handled transparently by the browser and server |
| Basic authentication: | a user name and password are required, and that information is sent as plain text |
| Symmetric (private-key) encryption: | The same key is used to encrypt and decrypt messages |
| Asymmetric (public-key) encryption: | Two keys are used to encrypt and decrypt messages: a public key and a private key |
| Hash (one-way) encryption: | Uses hashes to verify the integrity of transmitted messages |
| Digital certificates: | you must have the proper digital certificate to gain access |
| User names and passwords: | used to log on to private and public networks, including the Internet |
| Digital signatures: | electronic signatures that verify the identity of the message sender |
| Non-repudiation: | digital signatures prove that a transaction or transmission took place; neither the sender nor the receiver can later deny the action |
| Encryption: | the process of converting data into an unreadable form of text |
| Decryption: | the process of converting the encrypted data back to its original form |
| Key: | a mathematical algorithm |
| Secure Sockets Layer (SSL): | a protocol for secure exchanges |
| Virus: | damages computers and networks, often alters files to damage or destroy data |
| Worm: | resides in active memory and replicates itself until an entire disk is full |
| Trojan: | appears to be harmless (such as a computer game) but produces harmful results |
| Illicit server: | installs hidden services on systems |
| Client code: | allows remote access to a computer by an attacker |
| Server code: | infects destination computer and enables the attacker to control it |
| Common ways to contract viruses: | Receive infected disc/drive from colleague or friend Download infected file Download illicit server attachment Copy to your hard disk a document infected with a macro virus |
| If you receive an attachment you do not recognize: | o Do not open the attachment o Contact the sender to determine whether the attachment is legitimate o If you cannot contact the sender, delete the attachment from the message o Delete the attachment from the Deleted Items folder |
| If you suspect a virus attack: | o Use anti-virus software to remove the virus o If you cant launch anti-virus software, reboot from a known clean system disk, launch anti-virus software o Remove virus from all disks/file/programs o If damage is too extensive, reformat hard disk, |
| Spyware | an application secretly placed on a user’s system to covertly gather information and relay it to outside parties, usually for advertising purposes |
| Cookies are not spyware because: | The user is aware of their presence The user has the option to disable outside access to cookie information Use spyware detection applications to detect and eliminate spyware |
| Update: | a software upgrade that permanently fixes known bugs and improves software performance |
| Patch: | a temporary bug fix |
| Virus update: | files of virus signature profiles you use to keep your anti-virus software current |
| Typosquatting: | registering a domain name similar to a high-volume site hoping to receive traffic from users seeking the high-volume site who mistakenly enter an incorrect URL in the browser |
| Firewall: | a collection of hardware, software and corporate policies that prevents unauthorized access to or from private networks |