Vocabulary 1 Adware A program that downloads on your computer when you install a freeware program game or utility Generally adware enables sponsored advertisements to appear in a section of your browser window or as a pop up ad box 2 Antivirus software Software that is specifically designed to detect viruses and protect a computer and files from harm 3 Backdoor program A program that enables a hacker to take complete control of a computer without the legitimate user s knowledge or permission 4 Backup A backup is a copy of computer files that you can use to replace the originals if they are lost or damaged 5 Biometric authentication device A device that uses some unique characteristic of human biology to identify authorized users 6 Black hat hacker A hacker who uses his knowledge to destroy information or 7 Boot sector virus A virus that replicates itself into the master boot record of for illegal gain a flash drive or hard drive 8 Botnet A large group of software applications called robots or bots that runs without user intervention on a large number of computers 9 Computer forensics The application of computer systems and techniques to gather potential legal evidence a law enforcement specialty used to fight high tech crime 10 Cookie A small text file that some Web sites automatically store on a client computer s hard drive when a user visits the site 11 Cybercrime Any criminal action perpetrated primarily through the use of a 12 Cybercriminal An individual who uses computers networks and the Internet computer to perpetrate crime 13 Cyberloafing Doing anything with a computer that is unrelated to a job such as playing video games while one is supposed to be working Also called cyberslacking 14 Data breach When sensitive or confidential information is copied transmitted or viewed by an individual who was never authorized to handle the data 15 Data file File that contains stored data 16 Denial of service DoS attack An attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system that tie up its resources and deny legitimate users access 17 Distributed denial of service DDoS attack An automated attack that is launched from more than one zombie computer at the same time 18 Drive by download The use of malicious software to attack your computer by downloading harmful programs onto your computer without your knowledge while you are surfing a Web site 19 E mail virus A virus transmitted by e mail that often uses the address book in the victim s e mail system to distribute itself 20 Encryption virus A malicious program that searches for common data files and compresses them into a file using a complex encryption key thereby rendering the files unusable 21 Firewall A software program or hardware device designed to prevent unauthorized access to computers or networks 22 Geotag Data attached to a photograph that indicate the latitude and longitude where you were standing when you took the photo 23 Grey hat hackers A cross between black and white they will often illegally break into systems merely to flaunt their expertise to the administrator of the system they penetrated or to attempt to sell their services in repairing security breaches 24 Hacker Anyone who unlawfully breaks into a computer system whether an individual computer or a network 25 Hoax An e mail message or Web site that contains information that is untrue and is published with the purpose of deceiving others 26 Identity theft The process by which someone uses personal information about someone else such as the victim s name address and Social Security number to assume the victim s identity for the purpose of defrauding others 27 Image backup A copy of an entire computer system created for restoration purposes 28 Incremental backup A type of backup that only backs up files that have changed since the last time files were backed up 29 Inoculation A process used by antivirus software compares old and current qualities of files to detect viral activity 30 Internet Protocol address IP address The means by which all computers connected to the Internet identify each other It consists of a unique set of four numbers separated by dots such as 123 45 178 91 31 Keystroke logger A type of spyware program that monitors keystrokes with the intent of stealing passwords login IDs or credit card information 32 Logic bomb A computer virus that runs when a certain set of conditions is met such as when specific dates are reached on the computer s internal clock 33 Logical port A virtual communications gateway or path that enables a computer to organize requests for information such as Web page downloads and e mail routing from other networks or computers 34 Logical port blocking A condition in which a firewall is configured to ignore all incoming packets that request access to a certain port so that no unwanted requests will get through to the computer 35 Macro virus A virus that is distributed by hiding it inside a macro 36 Malware Software that is intended to render a system temporarily or permanently useless or to penetrate a computer system completely for purposes of information gathering Examples include spyware viruses worms and Trojan horses 37 Master boot record MBR A small program that runs whenever a computer boots up 38 Multipartite virus Literally meaning multipart virus a type of computer virus that attempts to infect both the boot sector and executable files at the same time 39 Network address translation NAT A process that firewalls use to assign internal Internet Protocol IP addresses on a network 40 Packet data packet A small segment of data that is bundled for sending over transmission media Each packet contains the address of the computer or peripheral device to which it is being sent 41 Packet analyzer sniffer A computer hardware device or software program designed to detect and record digital information being transmitted over a network 42 Packet filtering A feature found in firewalls that filters out unwanted data packets sent to specific logical ports 43 Personal firewall A firewall specifically designed for home networks 44 Pharming Planting malicious code on a computer that alters the browser s ability to find Web addresses and directs users to bogus Web sites 45 Phishing The process of sending e mail messages to lure Internet users into revealing personal information such as credit card or Social Security numbers or other
View Full Document