Brute force attack A technique where software creates many possible

Brute force attack a technique where software creates

This preview shows page 24 - 27 out of 41 pages.

Brute force attack A technique where software creates many possible combinations of characters in an attempt to guess passwords to gain access to an network or a computer. Firewall
A tool commonly used by organizations to protect their corporate networks when they are attached to the Internet. A firewall can be either hardware or software, or a combination of the two. It examines all incoming messages or traffic to the network. The firewall can be set up to allow only messages from known senders into the corporate network; it can also be set up to look at outgoing information from the corporate network. Flash drives Small, removable storage devices. Hackers Computer-savvy individuals most commonly thought of as malicious people who hack, or break, through security to steal or alter data and information Integrity Quality and accuracy People have confidence that the information they are provided is, in fact, true. Intrusion detection devices hardware and software that allow groups to monitor who is using its network and which files that user has accessed. Intrusion detection system Method of security that uses both hardware and software detection devices as a system that can be set up to monitor a single computer or network. Jump drives Small, removable storage devices. Malicious code Software that includes spyware, viruses and worms Malicious insiders Insiders who sabotage or add malicious code or gets into systems to cause damage or to steal data and information. Malware A malicious program or software that infects a device and is intended to steal information, take control or destroy data, information, or the device. Mask Method that a proxy server uses to protect the identity of a corporation’s employees while they are surfing the World Wide Web The proxy server keeps track of which employees are using which masks and directs the traffic appropriately. Negligent insider
Someone is a good but careless employee who unintentionally exposes a network to security vulnerabilities by ignoring or forgetting about proper security procedures Network Connections of computers that can be local or organizationally based, joined together into a local area network, on a wider area scope Network accessibility The ability of the network to be accessed by the right user to obtain what that person needs when he or she needs it Network availability The state in which network information is accessible when needed. Network security The specific precautions taken to ensure that the integrity of a network is safe from unauthorized entry and that the data and information stored on the network are accessible only by authorized users Phishing An attempt to steal information by manipulating the recipient of an e-mail or phone call to provide passwords or other private information.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture