Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

ITECH Ch 19

TermDefinition
Biometrics Technologies that measure and analyze human body characteristics for identification or authentication
Black hat hackers A computer criminal
Blacklists Programs that deny the entry or exit of specific IP addresses, products, Internet domains, and other communication restrictions.
Botnets Hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks.
Brute-force attacks An attack that exhausts all possible password combinations in order to break into an account.
CAPTCHAs An acronym standing for completely automated public Turing test to tell computers and humans apart
Cash-out fraudsters Criminals who purchase assets from data harvesters to be used for illegal financial gain
Certificate authority A trusted third party that provides authentication services in public key encryption schemes.
Data harvesters Cybercriminals who infiltrate systems and collect data for illegal resale
Distributed denial of service (DDoS) An attack where a firm's computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site's use.
Dumpster diving Combing through trash to identify valuable assets.
Encryption Scrambling data using a code or formula, known as a cipher, such that it is hidden from those who do not have the unlocking key.
Firewalls A system that acts as a control for network traffic, blocking unauthorized traffic while permitting acceptable use.
Hack A term that may, depending on the context, refer to either 1) breaking into a computer system, or 2) a particularly clever solution.
Hacker A term that, depending on the context, may be applied to either 1) someone who breaks into computer systems, or 2) to a particularly clever programmer.
Hacktivists A protester seeking to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage.
Honeypots A seemingly tempting, but bogus target meant to draw hacking attempts.
Intrusion detection systems A system that monitors network use for potential hacking attempts. Such a system may take preventative action to block, isolate, or identify attempted infiltration, and raise further alarms to warn security personnel.
Key (encryption) Code that unlocks encryption.
Multi-factor authentication When identity is proven by presenting more than one item for proof of credentials. Multiple factors often include a password and some other identifier
Phishing A con executed using technology, typically targeted at acquiring sensitive information or tricking someone into installing malicious software.
Public key encryption A two-key system used for securing electronic transmissions. One key distributed publicly is used to encrypt (lock) data, but it cannot unlock data. Unlocking can only be performed with the private key
Shoulder surfing Gaining compromising information through observation (as in looking over someone's shoulder).
Spoofed Term used in security to refer to forging or disguising the origin or identity. E-mail transmissions and packets that have been altered to seem as if they came from another source.
Voice-print Technology that identifies users via unique characteristics in speech.
White hat hackers Someone who uncovers computer weaknesses without exploiting them. The goal of the white hat hacker is to improve system security.
Whitelists Highly restrictive programs that permit communication only with approved entities and/or in an approved manner.
Zero-day exploits Attacks that are so new that they haven't been clearly identified, and so they haven't made it into security screening systems.
Created by: user-1740947
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards