Chapter 4
Chapter 5
Chapter 6
Network Threat's
Network Security
100
An examination of information systems , their inputs, outputs, and processing
What is Audit
100
A binary digit-that is , a 0 or a 1
What is Bit
100
A virtual meeting place where groups of regulars come to "gab" electronically.
What is Chat room
100
A computer that has been compromised by, and under the control of, a hacker
What is Bot
100
Software packages that attempt to identify and eliminate viruses, worms, and other malicious software.
What is Antivirus software
200
A backup location that provides only rudimentary services and facilities
What is Cold site
200
A group of eight bits that represents a single character.
What is Byte
200
A common local area network protocol.
What is Ethernet
200
Segments of computer code embedded within an organization's existing computer programs
What is logic bombs
200
The process of converting an original message into a form that cannot be read by anyone except the intended receiver.
What is Encryption
300
Defense mechanisms
What is controls
300
Definition of the way data in a DBMS are conceptually structured.
What is Data model
300
A company that provides Internet connections for a fee.
What is Internet service provider
300
Alien software that can record your keystrokes and/or capture your passwords
What is spyware
300
A private combination of characters that only the user should know.
What is Password
400
Small amounts of information that Web sites store on your computer, temporarily or more or less permanently
What is Cookie
400
The more objective, rational, and technical types of knowledge.
What is Explicit knowledge
400
Computers that act as exchange points for the Internet traffic and determine how traffic is routed.
What is Network access points
400
A software program containing a hidden function that presents a security risk.
What is Trojan horse
400
A private network that uses a public network ( usually the Internet ) to securely connect users by using encryption.
What is Virtual private network
500
The likelihood that a threat will occur
What is Risk
500
A grouping of logically related fields; describes an entity.
What is Record
500
Online universities in which students take classes via the Internet at home or an off-site location.
What is Virtual universities
500
Destructive programs that replicate themselves without requiring another program to provide a safe environment for replication.
What is Worms
500
A process in which a company identifies certain types of software that are not allowed to run in the company environment.
What is Blacklisting
M
e
n
u