100%(170)170 out of 170 people found this document helpful
This preview shows page 24 - 27 out of 41 pages.
○Brute force attack■A technique where software creates many possible combinations ofcharacters in an attempt to guess passwords to gain access to an network or a computer.○Firewall
■A tool commonly used by organizations to protect their corporate networks when they are attached to the Internet. ■A firewall can be either hardware or software, or a combination of the two. It examines all incoming messages or traffic to the network.■The firewall can be set up to allow only messages from known senders into the corporate network; it can also be set up to look at outgoing information from the corporate network.○Flash drives■Small, removable storage devices.○Hackers■Computer-savvy individuals most commonly thought of as malicious people who hack, or break, through security to steal or alter data and information○Integrity■Quality and accuracy■People have confidence that the information they are provided is, infact, true.○Intrusion detection devices■hardware and software that allow groups to monitor who is using itsnetwork and which files that user has accessed.○Intrusion detection system■Method of security that uses both hardware and software detection devices as a system that can be set up to monitor a single computer or network. ○Jump drives■Small, removable storage devices.○Malicious code■Software that includes spyware, viruses and worms ○Malicious insiders■Insiders who sabotage or add malicious code or gets into systems to cause damage or to steal data and information.○Malware■A malicious program or software that infects a device and is intended to steal information, take control or destroy data, information, or the device.○Mask■Method that a proxy server uses to protect the identity of a corporation’s employees while they are surfing the World Wide Web■The proxy server keeps track of which employees are using which masks and directs the traffic appropriately.○Negligent insider
■Someone is a good but careless employee who unintentionally exposes a network to security vulnerabilities by ignoring or forgetting about proper security procedures○Network■Connections of computers that can be local or organizationally based, joined together into a local area network, on a wider area scope ○Network accessibility■The ability of the network to be accessed by the right user to obtain what that person needs when he or she needs it○Network availability■The state in which network information is accessible when needed.○Network security■The specific precautions taken to ensure that the integrity of a network is safe from unauthorized entry and that the data and information stored on the network are accessible only by authorizedusers○Phishing■An attempt to steal information by manipulating the recipient of an e-mail or phone call to provide passwords or other private information.