CIS 105 Survey of Computer Information Systems
Download
Report
Transcript CIS 105 Survey of Computer Information Systems
CIS 105
Survey of Computer Information Systems
Essential Concepts and Terminology
Study Unit 12
CIS 105 Concepts and Terminology Unit 12
Computer Security Risk.
Any event, action, or situation that
could lead to loss or destruction of
computer systems or data.
CIS 105 Concepts and Terminology Unit 12
Computer Crime.
Use of a computer in a manner that
violates the law.
CIS 105 Concepts and Terminology Unit 12
Cybercrime.
Use of the Internet to carry out illegal
activities.
CIS 105 Concepts and Terminology Unit 12
Authentication.
Regarding computer systems, those
techniques used to control access.
CIS 105 Concepts and Terminology Unit 12
Packet Sniffer.
A program that examines all traffic on a
section of network to find passwords,
credit card numbers and other
information of value.
CIS 105 Concepts and Terminology Unit 12
Social Engineering.
A form of deception designed to cause
people to divulge sensitive information.
CIS 105 Concepts and Terminology Unit 12
Superuser Status.
A classification, in multi-user operating
systems, enabling administrative access
to virtually all files on a network.
CIS 105 Concepts and Terminology Unit 12
SATAN.
A security loophole analysis program
designed for use by system
administrators (and abused by
electronic intruders) to detect insecure
systems.
CIS 105 Concepts and Terminology Unit 12
Computer Virus.
A program designed to attach itself to a
file, reproduce, and spread from one file
to another, destroying data, displaying
an irritating message, or otherwise
disrupting computer operations.
CIS 105 Concepts and Terminology Unit 12
File Infector.
Computer viruses that attach to
program files and spread when the
program is executed.
CIS 105 Concepts and Terminology Unit 12
Boot Sector Virus.
A computer virus that infects the
sectors on a disk that contain the data
a computer uses during the boot
process. This type of virus does not
require a program to spread, and may
cause the destruction of all data on a
drive.
CIS 105 Concepts and Terminology Unit 12
Macro Virus.
A computer virus that infects the
automatic command execution
capabilities (macros) of productivity
software. Macro viruses are typically
attached to documents and
spreadsheets.
CIS 105 Concepts and Terminology Unit 12
Executable File.
A file containing instructions capable of
running on a computer, usually with an
.exe extension if intended for use on a
PC.
CIS 105 Concepts and Terminology Unit 12
Time Bomb (Logic Bomb).
A computer program (virus) designed to
stay in a computer system undetected
until it is triggered at a certain date or
time, or by a certain event.
CIS 105 Concepts and Terminology Unit 12
Worm.
A program designed to enter a
computer system, usually a network,
and replicate itself. Worms can take
control of resources to attack other
computers.
CIS 105 Concepts and Terminology Unit 12
Trojan Horse.
A computer program that appears to
perform a useful function while actually
doing something malicious, such as
inserting a virus, stealing a password,
or destroying data.
CIS 105 Concepts and Terminology Unit 12
Hackers.
The term "hacker” once meant a
computer hobbyist or a computer
novice. In most contexts today, it
means a person who has gained
unauthorized access to a computer
system.
CIS 105 Concepts and Terminology Unit 12
Crackers.
People who break into a computer
system with intent to damage files or
steal data, or who are driven to hack
highly secure systems.
CIS 105 Concepts and Terminology Unit 12
Trap Door.
A means to bypass normal security
precautions and enter a computer
system. A trap door is often created
during computer installation and
testing, or for personal exploitation.
CIS 105 Concepts and Terminology Unit 12
Power Spike.
A sudden increase of power that lasts
less than a millionth of a second.
CIS 105 Concepts and Terminology Unit 12
Power Surge.
A sudden increase of power that can
last several seconds. Power surges can
destroy electronic components.
CIS 105 Concepts and Terminology Unit 12
Uninterruptible Power Supply
(UPS).
A battery-powered device that detects
power outages and voltage drops, and
automatically replaces the electrical
supply source without interruption.
CIS 105 Concepts and Terminology Unit 12
Callback System.
A system to control access to a
computer by verifying information and
calling the person requesting access at
a specified phone number.
CIS 105 Concepts and Terminology Unit 12
Tokens.
Handheld electronic devices, used to
authenticate users, that generate logon
codes, and that may provide digital
certificates.
CIS 105 Concepts and Terminology Unit 12
Smartcards.
Credit card-sized devices with their own
internal memory, often used to control
access to computer networks.
CIS 105 Concepts and Terminology Unit 12
Biometric Authentication.
Biological measurements, such as
fingerprinting, retinal scans, and voice
or facial recognition, used to verify a
person's identity.
CIS 105 Concepts and Terminology Unit 12
Firewall.
A program to prevent or limit external
access to a computer from networked
connections.
CIS 105 Concepts and Terminology Unit 12
Anti-Virus Software.
Computer programs used to scan
computer memory and disks to identify,
isolate, and eliminate viruses.
CIS 105 Concepts and Terminology Unit 12
Backup Software.
Programming used to periodically make
a backup copy of specified hard disk
data, to enable restoring lost material.
CIS 105 Concepts and Terminology Unit 12
End of Study Unit 12.
Return to first slide
Move to Study Unit 13
CIS 105 Home Page
CIS 105 Concepts and Terminology Unit 12
Created by James Q. Jacobs