Computer Security
Ans- concerned w/ risk mgmt, confidentiality, integrity, and availability of
the electronic info that is processed and stored w/in a computing system
Risk Mgmt
Ans- recognition, consequences, and assessment of risk to a comp's assets.
Also developing strategies to manage an...
Ans- concerned w/ risk mgmt, confidentiality, integrity, and availability of
the electronic info that is processed and stored w/in a computing system
Risk Mgmt
Ans- recognition, consequences, and assessment of risk to a comp's assets.
Also developing strategies to manage and protect them
Hacker/Hacktivist
Ans- someone who tries to invade or disable a comp's security measures and
then steals comp resources
,Firewall
Ans- specialized hard and software that ensures only authorized personnel
and employees w/in a business can use intranet
Proxy Server
Ans- special security comp.
-allows communication in or out.
-protects from external threats
Default-deny
Ans- firewall rule that only allows network connections that have been
permitted
Default-allow
Ans- firewall rule that allows all traffic unless it's been blocked
Computer/Metamorphic Virsues
,Ans- files that reproduce by making copies of them w/in a comp's memory,
storage, or on a network
Malware
Ans- programs intended to damage comp system w/out end user knowing
Experimental Hardware
Ans- research project to understand how to combat malware
Worms
Ans- like a virus in a sense that it replicates itself, but can be worse bc
doesn't need to attach itself to an existing program to spread
-travels through network
-can harm by slowing performance, erasing files, damaging physical hardware
Trojan Horse
Ans- seems harmless and even interesting at first until executed
, -can release any sort of malicious programs
-doesn't need user intervention, waits for an action or date
Spyware
Ans- comp program installed to capture or take control of a system w/user
knowledge or consent
-monitors key strokes
-installs new software
Adware
Ans- advertising supported software. Irritating bc not malicious
-from internet w/out user intervention
-adware programmers motivated for economic reasons
Spamming
Ans- abuse of email system to send millions of bulk
-advertising, chain letters, criminal schemes
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller ExamArsenal. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.79. You're not tied to anything after your purchase.