1371 Words6 Pages
Caleb Olumuyiwa N/T 2580 Introduction To Information Security Week 2 A ssigment Define Key Terms. Adware | A software program that collects infor- mation about Internet usage and uses it to present targeted advertisements to users. Asset | Any item that has value to an organization or a person. Attack | An attempt to exploit a vulnerability of a computer or network component Backdoor | An undocumented and often unauthor- ized access method to a computer resource that bypasses normal access controls. Black-hat hacker | A computer attacker who tries to break IT security for the challenge and to prove technical prowess. Cookie | A text file sent from a Web site to a Web browser to store for later use. Cookies contain details gleaned…show more content…
Phreaking | The act of studying, experimenting with, or exploring telephone systems, telephone company equipment, and systems connected to public telephone networks. . Pop-up | A type of window that appears on top of the browser window. Pop-ups generally contain ads. Although pop-ups are not strictly adware, many adware programs use them to interact with users. Replay attack | An attack in which the attacker captures data packets from a network and retrans- mits them to produce an unauthorized effect Rootkit | A type of malware that modifies or replaces one or more existing programs to hide the fact that a computer has been compromised. script kiddie | A person with little or no computer- attack skills. Script kiddies simply follow directions or use a cookbook approach without fully under- standing the meaning of the steps they are performing. security breach | Any event that results in a violation of any of the A-I-C security tenets. session hijacking | A network attack in which the attacker attempts to take over an existing connection between two network computers. smurfing | A DoS attack that uses a directed broad- cast to create a flood of network traffic for the victim computer sniffer | An application that captures traffic as it travels across a network spam | Unwanted e-mail or instant messages spear phishing | An e-mail or instant-message
Open Document