click below
click below
Normal Size Small Size show me how
Module 3
| Question | Answer |
|---|---|
| szyfrowanie | encryption |
| hash | encrypted value |
| SSL | Secure Sockets Layer |
| zombie computer army | botnet |
| DDoS | Distributed Denial of Service |
| znajduje sie w programie komputwrowym | computer virus |
| wyłudzanie poufnaych informacji przez podszywanie | phishing |
| another name of crackers | black hats |
| zaosoby | resources |
| uśpiony | dormant |
| rozmnażać się | reproduce |
| komórka | cell |
| wyświetlać | display |
| wywoływać, wyzwalać, powodować | trigger |
| gospodarz | host |
| niszczycielski | destructive |
| rezydentny | resident |
| łatanie (operating system) | patching |
| hides the presence of the code | misdirection |
| attaches a copy of itself to another program | reproduction |
| trigger | decides when and how to activate the payload |
| payload | does the damage |
| nieśc kogoś na barana | piggyback |
| zakazany | prohibited |
| oszpecić, niszczyć wygląd czegoś | deface |
| klapa w podłodze | trapdoors |
| zalać | swamp |
| ujawnić | reveal |
| przekierować | redirect |
| wióry, stryżyny | shavings |
| niedozwolony, zakazany | illict |
| gromadzić | accumulate |
| poufny, tajny | confidential |
| zalać, zasypać | inundate |
| ukryty | concealed |
| odejmować | deduct |
| leaving, within a completed program, an illicit program that allows unauthorised and unknown entry | trapdoors |
| adding concealed instructions to a computer program so that it will still work but will also perform prohibited duties. In other words, it appears to do something useful but actually does something destructive in the background. | Trojan horse |
| swamping a server with large number of requests. | denial of service attack |
| manipulating programs or data so that small amounts of money are deducted from a large number of transactions or accounts and accumulated elsewhere. The victims are often unaware of the crime because the amount taken from any individual is so small. | salamis shaving |
| redirecting anyone trying to visit a certain site elsewhere | hijacking |
| unauthorised copying of a program for sale or distributing to other users | software piracy |
| changing the information shown on another person’s website | defacing |
| using another person’s identification code or using that person’s files before he/she has logged off. | piggybacking |
| tricking a user into revealing confidential information such as an access code or a credit-card number. | phishing |
| inundating an email address with thousands of messages, thereby slowing or even crashing the server. | mail bombing |
| wykryć | detect |
| zmienić | alter |
| oszust | impostor |
| w transporcie, podczas transportu | in transit |
| zapobiec | prevent |
| w odwrotnej kolejności | in reverse |
| kupić, nabyć, dokonać zakupu | purchase |
| osoba trzecia | third party |
| legalny | legitimate |
| bełkot | gibberish |
| zasady | tenets |
| manipulować, grzebać, naruszać | tamper |
| przetrawić | digest |
| wystawić, wydać | issue |
| rozszyfrować | decipher |