1 / 0

Orientation Vocabulary

Orientation Vocabulary. Cybercrime. a crime committed on a computer network, esp. the Internet. Hacker. a microcomputer user who attempts to gain unauthorized access to proprietary computer systems. Cyberextortionist.

idola
Download Presentation

Orientation Vocabulary

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Orientation Vocabulary

  2. Cybercrime a crime committed on a computer network, esp. the Internet
  3. Hacker a microcomputer user who attempts to gain unauthorized access to proprietary computer systems
  4. Cyberextortionist refers to someone who uses emails as an offensive force. They would usually send a company a very threatening email stating that they will release some confidential information, exploit a security leak, or launch an attack that will harm a company's network. They will request a paid sum of money to prevent the threat from being carried out, a bit like black-mailing.
  5. Cyberterrorist someone who uses a computer network or the internet to destroy computers for political reasons. It's just like a regular terrorist attack because it requires highly skilled individuals, millions of dollars to implement, and years of planning.
  6. Virus malicious code that replicates itself. New viruses are discovered daily. Some exist simply to replicate themselves. Others can do serious damage such as erasing files or even rendering the computer itself inoperable.
  7. Worm similar to a virus. They replicate themselves like viruses, but do not alter files like viruses do. The main difference is that worms reside in memory and usually remain unnoticed until the rate of replication reduces system resources to the point that it becomes noticeable.
  8. Trojan horse is called such as a reference to the story of the Trojan horse from Greek legend. It is a malicious program disguised as a normal application. Trojan horse programs do not replicate themselves like a virus, but they can be propagated as attachments to a virus.
  9. Antivirus software (program) a type of application you install to protect your system from viruses, worms and other malicious code. Most antivirus programs will monitor traffic while you surf the Web, scan incoming email and file attachments and periodically check all local files for the existence of any known malicious code.
  10. Virus signature A unique string of bits, or the binary pattern, of a virus. The virus signature is like a fingerprint in that it can be used to detect and identify specific viruses. Anti-virus software uses the virus signature to scan for the presence of malicious code.
  11. Quarantine To move an infected file, such as a virus, into an area where it cannot cause more harm. Antivirus software come with quarantine options so that the user also can keep track of virus activity.
  12. Denial of Service attack MARK THIS ONE OFF 
  13. Back door an undocumented way to get access to a computer system or the data it contains; type of malware
  14. Email Spoofing the act of forging the header information on an email so that it appears to have originated from somewhere other than its true source.
  15. Firewall a protective barrier between your computer, or internal network, and the outside world; a security feature for your computer
  16. Freeware any program offered free of charge
  17. Malware term that refers to various types of software that can cause problems or damage your computer. can consist of viruses, worms, Trojan horses, macro viruses, and backdoors.
  18. Vulnerability any flaw or weakness in the network defense that could be exploited to gain unauthorized access to, damage or otherwise affect the network.
  19. Unauthorized Access Gaining access to a network or a computer without proper approval.
  20. Username A name used to gain access to a computer system.
  21. Password A secret series of characters that enables a user to access a file, computer, or program.
More Related