Chapter 4
Chapter 5
Chapter 6
Types of Software Attacks
Communications Media and Channels
100
A computer that has been compromised by, and under the control of, a hacker.
What is bot
100
A binary digit -- that is, a 0 or a 1.
What is Bit
100
A common local area network protocol.
What is Ethernet
100
Segment of computer code that performs malicious actions by attaching to another computer program.
What is Virus
100
Is the most prevalent form of communication s wiring.
What is Twisted-pair wire
200
A private combination of characters that only the user should know.
What is Password
200
A group of eight bits that represents a single character.
What is Byte
200
The transmission capacity of a network, stated in bits per second.
What is Bandwidth
200
Segment of computer code that performs malicious actions and will replicate, or spread, by itself (without requiring another computer program).
What is Worm
200
Insulated copper wire; used to carry high-speed data traffic and television signals.
What is Coaxial Cable
300
Copying a software program (other than freeware, demo software, etc.) without making payments to the owner.
What is Piracy
300
A grouping of logically related records.
What is Table
300
A virtual meeting place where groups of regulars come to "gab" electronically.
What is Chat Room
300
Software programs that hide in other computer programs and reveal their designed behavior only when they are activated.
What is Trojan Horse
300
Consists of thousands of very thin filaments of glass fibers that transmit information via light pulses generated by lasers.
What is Fiber-Optic Cable
400
The process of converting an original message into a form that cannot be read by anyone except the intended receiver.
What is Encryption
400
An approach to managing information across an entire organization.
What is Data Governance
400
The system administered by the ICANN that assigns names to each site on the Internet.
What is Domain Name System (DNS)
400
Use description to acquire sensitive personal information by masquerading as official-looking e-mails or instant messages.
What is Phishing Attack
400
Communications channels that use physical wires or cables to transmit data and information.
What is Cable Media
500
War in which a country's information systems could be paralyzed from a massive attack by destructive software.
What is cyberwarfare
500
Databases that can manipulate structured as well as unstructured data and inconsistent or missing data; are useful when working with Big Data.
What is NoSQL databases
500
The transmission technology that divides blocks of text into packets.
What is Packet Switching
500
Segment of computer code that is embedded within an organization's existing computer programs and is designed to activate and perform a destructive action at a certain time or date.
What is Logic Bomb
500
Communications channels that use electromagnetic media to transmit data.
What is Broadcast Media
M
e
n
u