ITM 100 Lecture Notes - Machine-Readable Medium, Web Server, Wireless Network

17 views4 pages

For unlimited access to Class Notes, a Class+ subscription is required.

Security Policies, procedures, and technical measures used to prevent unauthorized access, alteration,
theft, or physical damage to information systems.
Controls All of the methods, policies, and procedures that ensure protection of the organization’s
assets, accuracy, and reliability of its records, and operational adherence to management standards.
War Driving Technique in which eavesdroppers drive by buildings or park outside and try to intercept
wireless network traffic.
Malware Malicious software programs such as computer viruses, worms and Trojan horses.
Computer virus Vogue software program that attaches itself to other software programs or data files
in order to be executed, often causing hardware and software malfunctions.
Worms Independent software programs that propagate themselves to disrupt the operation of
computer networks or destroy data and other programs.
Trojan horse A software program that appears legitimate but contains a second hidden function that
may cause damage.
Spyware Technology that aids in gathering information about a person or organization without their
knowledge.
Key logger Spyware that records every keystroke made on a computer to steal personal information or
passwords or to launch Internet attacks.
Hacker A person who gains unauthorized access to a computer network for profit, criminal mischief, or
personal pleasure.
Cyber vandalism Intentional disruption, defacement, or destruction of a Web site or corporate
information system.
Spoofing Attempts by hackers to hide their true identities by using fake e-mail addresses or
masquerading as someone else; may involve redirecting a Web link to an address different from the
intended one, with the site masquerading as the intended destination.
Sniffer Type of eavesdropping program that monitors information travelling over a network.
Denial-of-service (DoS) attack Flooding a network server or Web server with false communications
requests for services in order to crash the network.
Distributed denial-of-service (DDoS) Numerous computers inundating and overwhelming a network
from numerous launch points.
Botnet A group of computers that have been infected with bot malware without users’ knowledge,
enabling a hacker to use the amassed resources of the computers to launch distributed denial-of-service
attacks, phishing campaigns, or spam.
Unlock document

This preview shows page 1 of the document.
Unlock all 4 pages and 3 million more documents.

Already have an account? Log in

Get access

Grade+
$10 USD/m
Billed $120 USD annually
Homework Help
Class Notes
Textbook Notes
40 Verified Answers
Study Guides
1 Booster Class
Class+
$8 USD/m
Billed $96 USD annually
Homework Help
Class Notes
Textbook Notes
30 Verified Answers
Study Guides
1 Booster Class