Tuesday, December 20, 2016

Chapter 12: Network Security

  • Mobile Malicious Code
    • A virus or worm that is designed to get transported over the Internet.
  • Trojan Horse
    • A destructive piece of code that hides inside a harmless-looking piece of code, such as an e-mail or an application macro.
  • Virus
    • A small program that alters the way a computer operates without the knowledge of the computer’s users and often does various types of damage by deleting and corrupting data and program files, or altering operating system components so that the computer operation is impaired or even halted.
  • Botnets
    • Malicious programs that take operations on a compromised computer.
  • Worm
    • A special type of virus that copies itself from one system to another over a network, without the assistance of a human being.
  • Denial-of-Service Attacks
    • A malicious hacking technique that bombards a computer site with so many messages that the site is incapable of performing its normal duties.
  • E-Mail Bombing
    • A malicious hacking technique in which a user sends an excessive amount of unwanted e-mail to someone.
  • Spoofing
    • A technique, commonly used by hackers, in which the data sender’s identity is disguised, as in the case of an e-mail message that has a return address of someone other than the person sending the e-mail.
  • Smurfing
    • The name of an automated program that attacks a network by exploiting Internet Protocol broadcast addressing and other aspects of internet operation.
  • Ping Storm
    • A form of attack in which the Internet ping program is used to send a flood of packets to a server to make the server inoperable.
  • Phishing
    • A Web-based attack that involves sending the victim an e-mail that is designed to look like a legitimate request coming from a well-known company, and thereby lure the victim into revealing private information.
  • Pharming
    • A Web-based attack in which a user seeking to visit a particular company’s Web site is unknowingly redirected to a bogus Web site that look exactly that company’s official Web site.
  • Rootkit
    • A program, often malicious, that is stored deep within a user’s operating system and is capable of redirecting user requests and performing errant operations.
  • Key logger
    • A program, often malicious, that records each keystroke a user makes on a keyboard at a computer workstation.
  • Surveillance
    • A common security measure used to monitor key locations to deter vandalism and theft by using video cameras and intrusion detection.
  • Intrusion Detection
    • The ability to electronically monitor data flow and system requests into and out of a system.
  • Honeypot
    • A trap that is set by network personnel to detect unauthorized use of a network resource.
  • Access Rights
    • Permission assigned to a file or device; determine how a user or group of users may access the file or device.
  • Password
    • The most common form of protection from unauthorized use of a computer system; often a string of letters, numbers, and symbols

No comments:

Post a Comment