Java Games: Flashcards, matching, concentration, and word search.

Net. 1 Chapter 8

Security

AB
2 firewall network designbest for large corporations
adwareform of spyware, used to collect information about user based on websites the user visits, commonly installed by a user in exchange for a free product
anti-spam softwarefor email sofware, could mistakenly classify legitimate email as spam and block it
anti-virus softwaresofrware installed by end user to detect and remove viruses, worms, and Trojan horses from files and email
appliance based firewallfirewall build into a specific hardware device called a security appliance
brute forcetype of attack that may result in DoS, fast computer is trying to guess passwords to gain access to user accounts
denial of serviceattacks on computers wtih the intent to deny services to intended users, includes SYN flooding, ping of death, brute force, and DDos
DMZrefers to an area of the netowrk that is acessbile by both internal and external host devices
integrated firewallsfirewall implented by adding firewall functionality to an existing device such as a router
Internet filter optionprevents outside intruders from attacking the router through the Internet
personal firewallfirewall residing on host computer
phishingtype of social engineering typically done via email where an attacker might ask for verification of information
ping of deathping is sent with a packet greater in size than teh maximum allows
popupsannoying advertising windows that display when visiting a website, not intending to collect information
port forwardinga Linksys integrated router wil only let external traffic that is destined for specific internal prts be permitted, all other traffic is denied
pretextingtype of social engineering typically done over the phone where an invented scenario is used to get victim information
server based firewallfirewall that consists of a firewall application taht runs on a network operating system such as UNIX, Windows, or Novell
spamunwanted bulk mail sent by merchants advertising their products or services
SPI firewall protection optionwhen set to enabled, requires that packets coming into the router be responses to internal host requests
spywareprogram that gathers personal information from your computer without your permission, invormation is sent to others over teh Internet and can include passwords and account numbers
SYN floodingflood of packets with invalid source IP addresses requesting a connection
tracking cookiesform of spyware, used to record information about an Internet user when they visit websites, may be useful at times to save time
Trojan horseprogram written to appear like a legitimate program, and example may be a box stating you won a prize, when the user opens the box, a program is installed and allows the intruder acess to their computer
virusprogram that runs and spreads by modifying other programs, cannot start itself, must be activated, can be transmitted via email, downloaded files, instant message, or storage devices
vishingtype of social engineering typically done over Voice IP where an invented scenario is used to have the victim call a number wheich appears to be a legitimate bank and then has tehm verify their account numbers and passwords of their accounts
vulnerabiltiy analysis toolone function fhtat is provided by this tool is teh identification of missing security updates on a computer
wormsimilar to a virus by does NOT need to attach itself to an exisiting program in order for it to propagate inself across a network

This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities