33 Cards in this Set
Front | Back |
---|---|
Malware
|
software desgined to infiltrate or damage a computer system without the owners informed consent
|
TROJAN HORSE
|
harmful software that hides itself within an apparently useful program
|
Backdoor
|
gives attacker remote control of a computer over the internet
|
Rootkit
|
bad changes to the operating system that give attacker more capabilites
|
exploit
|
script or program that takes advantage of a vulnerability
|
computer virus
|
typically copied through email, network shares]
downloaded from website
damaging to annoying
attaches itself to an existing program
|
SQL slammer
|
spread globally 30 minutes after release
|
David SMith
|
Created melissa worm. spread through email macro
|
Why hack?
|
challenge
curiosity
entertainment
|
System development
|
a set of activities used to build an information system
|
SDLC= SOftware Development
|
Planning
Analysis
Design
Implementation
Operation,Support, Security
|
Project management
|
the process of planning, scheduling and then controlling activities during system development.
|
Gant Chart
|
popular tool used to plan and schedule the time and relationships among project activities. Henry Gant 1910
|
DFD= Data Dlow Diagram
|
a tool that graphically shows the flow data in a system
1. data dlows
2. processes
3. data stores
4. sources
|
Design
|
an inspection is a formal review of system development deliverable
- a team examines the deliverables to identify errors
|
Prototype
|
(proof of concept) is a working model of the proposed system
- inadequate or missing documentation
-users tend to embrace the prototype system
-should not eliminate or replace activity
|
Implementation
|
the purpose of implementation phase is to construct the new or modified system and then deliver it
|
Testing
|
various tests should be perfomed on the new sysetm
|
Operation support
|
purpose of the operation, support and security phase is to provide on going assistance for an information system and its users after the system is implemented
|
Security plan
|
-identify all information assests of an organization
-identify all risks tha may cause an information asset loss
-identify the safeguard that exists to detect prevention
|
XHTML
|
extensible hypertext mark up language(integration of HTML, CSS Rules of XML)
|
HTML 5
|
newer standards,
open source
end of flash
|
CSS-Cascading Style Sheets
|
- developed by W3c to use with XHTML
-add styles to your web page using internal/external styles
-contains instructions for formatting web page
|
hmtl
|
element defines beginning of document
|
Head
|
element contains information about the webpage
|
title
|
element defines text that will display on the title bar of web browser
|
body
|
selement defines the beginning content to be displayed
|
Span vs Div
|
span- inline element/applying formatting to text
div- a block element/ creates line breaks more powerful than span/controls width heigh border position.
|
LAN
|
network that connects computers and devices in a limited geographical area such as a home, school computer, laboratory, office building or closely postioned group of buildings
|
WLAN
|
local area network that uses no physical wires
|
WAN
|
network that covers a large geographic area, using communications channels that combines many tpes of media such as telephone lines, cables, and radio waves
|
Network topology
|
layout of computers and devices in a communications netwoek
|
IEEE
|
series of networks standards that specifies how two wireless devices communicate over the air with each other.
|