Security
Emerging Trends
Copyright
Security 2
Potpourri
100
Small file that contains information about you and your Web activities
What is a cookie
100
SaaS
What is Software as a Service
100
Its function is to exclusively identify the commercial source or origin of products or services,
What is a trademark?
100
Software written with the intention of wreaking havoc on a computer system
What is a virus?
100
Permits sending audio signal over digital lines
What is Voice over IP (VoIP)?
200
Form of social engineering in which an attacker attempts to fraudulently acquire sensitive information from a victim by impersonating a trustworthy third party.
What is phishing
200
RFID
What is Radio Frequency Identification
200
Making a copy by downloading to hard drive or Distributing copyrighted music over the net or Building a house from copyrighted design
What is Copyright Infringement?
200
Malicious software (that you don't want) that's hidden inside software you did want.
What is a Trojan Horse?
200
Unsolicited e-mail from businesses advertising goods and services
What is Spam?
300
Type of virus that spreads itself from computer to computer usually via e-mail
What is a worm?
300
ASP
What is an Application Service Provider?
300
In United States copyright law, this is a doctrine that permits limited use of copyrighted material without acquiring permission from the rights holders
What is "Fair Use"?
300
Software to generate ads that installs itself when you download another program
What is Adware?
300
Software that records all your keystrokes
What is keylogger software?
400
Malicious software who's purpose is to collect private information.
What is spyware?
400
A marketing strategy where goods and services are specifically targeted and sent to an individual based on specific knowledge of that individual
What is "Push" technology?
400
A tangible assets most often real estate.
What is "Real Property"?
400
The three components of a good security implementation
What is What you know, what you have and who you are? (Example?)
400
3 Security precautions you can take to protect yourself from malicious computer attacks (seven were listed in lecture)
What are: Backup Anti-virus software Firewall Access Authentication Biometrics Encryption Public Key Encryption (PKE) Intrusion detection software Security-auditing software
500
A computer attack where perpetrators use other peoples' computers to flood internet traffic to the target with the intent of overwhelming the server(s) so they stop functioning.
What is Denial of Service Attack? (DoS)
500
Where software is used in a pay-as-you-go model rather than purchased outright
What is Software as a Service?
500
A term where owners are granted certain exclusive rights to a variety of intangible assets, such as musical, literary, artistic works, discoveries and inventions.
What is Intellectual Property?
500
A collection of compromised computers connected to the Internet typically centrally controlled and used for malicious purposes
What is a Botnet?
500
Misuse of a company's IT resources (i.e. unrelated surfing, shopping, gambling, etc)
What is cyberslacking?
M
e
n
u