Theft of Time and Services – when employees use the company computer for non-work actives
194.
SOX (Sarbanes-Oxley Act) – full disclosure of accounting systems and protects whistleblowers to
prevent fraud
195.
Biometric Authentication Devices – the use of a person’s physical characteristics (fingerprinting and
retina scan)
196.
E-waste – discarded monitors, televisions, printers, cell phones, and other electronic devices
197.
Employees – 75-80% of computer crimes are committed by current and former employees
198.
Browser Hijacker – spyware that changes browser settings without your knowledge
199.
Adware – spyware that tracks surfing and online purchases (popups and other ads)
200.
Cookies – small text files left on your hard drive of the websites visited
201.
VoIP
(Voice over Internet Protocol) – internet protocol used to make phone calls over the internet
202.
MIDI – (Musical Instrument Digital Interface) – protocol used to communicate between electronic
musical instruments and devices that control and manage them.
Describes, musical notes, pitch and length
used to reproduce music
203.
Keystroke Logger – spyware that records each character typed, used to steal passwords
204.
ISPs – are connected to the internet backbone via a NAP (Network Access Point)
205.
Spoofing – forging and email senders name, sending a message that appears to come from someone
other than the sender.
Used by spammers
This
preview
has intentionally blurred sections.
Sign up to view the full version.
206.
Phishing – sending a legitimate looking email attempting to obtain financial information or passwords
207.
DOS (Denial of Service) – overloading a server or network by bombarding it with thousands or millions
of request making it unable to respond
208.
WORM – a program that copies itself and uses your contact information to infect all of your contacts
computers by sending an infected email; different from a Virus in which attaches to a file that is executed by
the user.
a.
Famous WORMS – Code RED, NIMDA, MYDOOM
209.
Logic Bombs – Viruses that are set to go off at certain time
210.
White Hat Hackers – professional hackers that break into computers with permission to identify security
flaws
211.
Cyber terrorists – politically motivated hackers who attach computers systems intending to cause large
scale physical or financial harm, typically attack Military, Banks, Power Plants, Water Treatment and Traffic
Control centers.
212.
The Advanced Research Projects Agency Network (ARPANET) was the world's first operational
packet
switching
network and the progenitor of what was to become the global
Internet
. The network was initially
funded by the
Advanced Research Projects Agency
(ARPA, later DARPA) within the
U.S. Department of
Defense
for use by its projects at universities and research laboratories in the US
This is the end of the preview.
Sign up
to
access the rest of the document.
- Winter '12
- None
- Personal computer
-
Click to edit the document details