Study Guides (238,076)
Canada (114,909)
CP102 (40)

Midterm 2 Review Modified CP102.docx

3 Pages
Unlock Document

Wilfrid Laurier University
Computer Science
Rick Henderson

CP102 Adware – a program that downloads on your computer when you install a freeware program, game, or utility Backdoor program – a program that enables a hacker to take complete control of a computer without the legitimate user’s knowledge or permission Backup – a copy of computer files that can be used to replace the originals if they are lost or damaged Biometric authentication device – a device that uses some unique characteristic of human biology to identify authorized users Black-hat hacker – a hacker who uses his knowledge to destroy information or for illegal gain Bomb software – software that destroys data on a computing device is someone continually tries to access information by guessing the password Boot-sector virus – a virus that replicated itself into the master boot record of a flash drive or hard drive Botnet – a large group of software applications that runs without user intervention on a large number of computers Cyberloafing – doing anything with a computer that is unrelated to a job Denial-of-service (DoS) attack – an attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system that tie up its resources and deny legitimate users access Distributed denial-of-service attack – an automated attack that is launched from more than one zombie computer at the same time Encryption virus – a malicious program that searched for common data files and compresses them into a file using a complex encryption key, thereby rendering the files unusable Image backup – a copy of an entire computer system, created for restoration purposes Inoculation – a process used by antivirus software; compares old and current qualities of files to detect viral activity Keystroke logger – a type of spyware program that monitors keystrokes with the intent of stealing passwords, login IDs, or credit card information Logic bomb – a computer virus that runs when a certain set of conditions is met, such as when specific data are keyed off the computer’s internal clock Logic port – a virtual communications gateway or path that enables a computer to organize requests for information from other networks or computers Logical port blocking – a condition in which a firewall is configured to ignore all incoming packets that request access to a certain port so that no unwanted requests will get through to the computer Malware – software that is intended to render a system temporarily or permanently useless or to penetrate a computer system completely for purposes of information gathering. Phishing – the process of sending e-mail messages to lure Internet users into revealing personal information such as credit card or
More Less

Related notes for CP102

Log In


Don't have an account?

Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.