Front Back
Malware
software desgined to infiltrate or damage a computer system without the owners informed consent
TROJAN HORSE
harmful software that hides itself within an apparently useful program
Backdoor
gives attacker remote control of a computer over the internet
Rootkit
bad changes to the operating system that give attacker more capabilites
exploit
script or program that takes advantage of a vulnerability
computer virus
typically copied through email, network shares] downloaded from website damaging to annoying attaches itself to an existing program
SQL slammer
spread globally 30 minutes after release
David SMith
Created melissa worm. spread through email macro
Why hack?
challenge curiosity entertainment
System development
a set of activities used to build an information system
SDLC= SOftware Development
Planning Analysis Design Implementation Operation,Support, Security
Project management
the process of planning, scheduling and then controlling activities during system development.
Gant Chart
popular tool used to plan and schedule the time and relationships among project activities. Henry Gant 1910
DFD= Data Dlow Diagram
a tool that graphically shows the flow data in a system 1. data dlows 2. processes 3. data stores 4. sources
Design
an inspection is a formal review of system development deliverable - a team examines the deliverables to identify errors
Prototype
(proof of concept) is a working model of the proposed system - inadequate or missing documentation -users tend to embrace the prototype system -should not eliminate or replace activity
Implementation
the purpose of implementation phase is to construct the new or modified system and then deliver it
Testing
various tests should be perfomed on the new sysetm
Operation support
purpose of the operation, support and security phase is to provide on going assistance for an information system and its users after the system is implemented
Security plan
-identify all information assests of an organization -identify all risks tha may cause an information asset loss -identify the safeguard that exists to detect prevention
XHTML
extensible hypertext mark up language(integration of HTML, CSS Rules of XML)
HTML 5
newer standards, open source end of flash
CSS-Cascading Style Sheets
- developed by W3c to use with XHTML -add styles to your web page using internal/external styles -contains instructions for formatting web page
hmtl
element defines beginning of document
Head
element contains information about the webpage
title
element defines text that will display on the title bar of web browser
body
selement defines the beginning content to be displayed
Span vs Div
span- inline element/applying formatting to text div- a block element/ creates line breaks more powerful than span/controls width heigh border position.
LAN
network that connects computers and devices in a limited geographical area such as a home, school computer, laboratory, office building or closely postioned group of buildings
WLAN
local area network that uses no physical wires
WAN
network that covers a large geographic area, using communications channels that combines many tpes of media such as telephone lines, cables, and radio waves
Network topology
layout of computers and devices in a communications netwoek
IEEE
series of networks standards that specifies how two wireless devices communicate over the air with each other.

Access the best Study Guides, Lecture Notes and Practice Exams

Login

Join to view and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?