Chapter 6: Emerging Security Threats graded A+
Adware - spyware that accumulates computer user information in order to send advertisements or direct a computer browser to specific websites for commercial purposes.
aftershock password breaches - subsequent computer breaches that occur ei...
Chapter 6: Emerging Security Threats graded A+ Adware - spyware that accumulates computer user information in order to send advertisements or direct a computer browser to specific websites for commercial purposes. aftershock password breaches - subsequent computer breaches that occur either because an individual uses the same password for multiple account or because attackers sell passwords to others boot sector virus - computer virus that infects a disk's system area botnet - non-malici ous hidden software that allows computers to be controlled and infected by one or more outside sources cloud - on-demand computing resources that are available over the Internet via remote servers instead of personal computers or local servers purchased by the user cookies - small text files placed and saved on one's computer by a website the individual has visited to store information about the user cybercrimes - crime with a computer aspect or that involves computer usage Cybersecurity - activitie s and processes that protect information systems and data against threats Cybersecurity Act of 2015 - legislation that provides for cyber -security information to be shared among private -sector and federal government agencies cyberspace - occupied by an interdependent network including the Internet, telecommunications networks and computer systems Data Loss Prevention (DLP) - the identification, monitoring, and protection of data at every stage in which it might exist. Denial of services (DoS) - the consequence of an attacker taking control of a device, network or website and flooding it with traffic that renders it unusable for legitimate users trying to access information or services Distributed Denial of Service (DDoS) - An attack where a firm's computer systems are flooded with thousands of seemingly legitimate requests, the sheer volume of which will slow or shut down the site's use. attacks are often performed via botnets. drive -by downloading - downloading and installation of malware without user knowledge Fake Antivirus - malware designed to imitate legitimate security software, thereafter stealing information from unsuspecting users file infector virus - a computer virus that infects executable program files Hackers - those who seeks to exploit weaknesses within a computer system or specifically, within software for their own gain Health Care Industry Cybersecurity (HCIC) Task Force - a think tank charged by the Cybersecurity Act of 2015 with addressing cybersecurity threats facing t he healthcare industry Hoax - an electronic communication that employs trickery
Los beneficios de comprar resúmenes en Stuvia estan en línea:
Garantiza la calidad de los comentarios
Compradores de Stuvia evaluaron más de 700.000 resúmenes. Así estas seguro que compras los mejores documentos!
Compra fácil y rápido
Puedes pagar rápidamente y en una vez con iDeal, tarjeta de crédito o con tu crédito de Stuvia. Sin tener que hacerte miembro.
Enfócate en lo más importante
Tus compañeros escriben los resúmenes. Por eso tienes la seguridad que tienes un resumen actual y confiable.
Así llegas a la conclusión rapidamente!
Preguntas frecuentes
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
100% de satisfacción garantizada: ¿Cómo funciona?
Nuestra garantía de satisfacción le asegura que siempre encontrará un documento de estudio a tu medida. Tu rellenas un formulario y nuestro equipo de atención al cliente se encarga del resto.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller InsightInk. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for $8.99. You're not tied to anything after your purchase.