Java Games: Flashcards, matching, concentration, and word search.

PC Security Terms

Terms taken from A+ Complete Study Guide (2009)

AB
malwaremalicious software (worms, Trojan horses, spyware, and adware) Spans from mild to moderate intrusion and/or destruction.
Virusa piece of software designed to infect a computer system. May do nothing or may damage data on HDD, destroy the OS and possibly spread to other systems.
Trojan horsea program that enters a system or network under the guise of another program
adwareunwanted pop-up advertisements
wormcan reproduce by itself, it is self-contained, and doesn’t need a host application to be transported
spywareworks on behalf of a 3rd party, not self-replicating but spread by users inadvertently asking for it. Users don’t know what it is they are installing/downloading
phishinga person or program attempting to gain information from a user/person for apparently legitimate use but is intended for improper use
keystroke loggerrecords the keystrokes of a user
spamunwanted, unsolicited email
DOS Attackprevent access to resources by users authorized to use those resources. They are common on the internet
hackera person attempting to gain access to data and/or resources they are not authorized to have
spoofing attackan attempt by someone or something to masquerade as someone else. IP and DNS Spoofing are most popular
IP spoofingan attack during which a hacker tries to gain access to a network by pretending their interface has the same network address as the internal network. It is where the data looks as if it came from a trusted host when it did not
DNS spoofingwhen the DNS server is given information about a name server that it thinks is legitimate when it is not. This can send users to a website other than the one they wanted to go to, reroute mail, or do any other type of redirection wherein data from a DNS server is used to determine a destination
rootkitshave the ability to hide certain things from the operating system. A process may be running but not show up in the process list, or connections that do not show up in a Netstat display
kerberosan authentication scheme that uses tickets (unique keys) embedded within messages. Named after the three-headed guard dog that stood at the gates of Hades in Greek mythology
CHAPchallenge handshake authentication protocol
PAPpassword authentication protocol
Graywarean application that is annoying or negatively affecting the performance of your computer
Securityto protect physicall and electronically the systems and data from damage, deletion, theft, or corruption



This activity was created by a Quia Web subscriber.
Learn more about Quia
Create your own activities