security

5  1    66 flashcards    fiszkotekaa123
download mp3 print play test yourself
 
Question Answer
cracker/ black-hat hacker
start learning
"przestępca komputerowy" xD
virus propagation
start learning
rozmnażanie, namnożenie się wirusów
fraud
start learning
oszustwo
scam
start learning
przekręt
phishing
start learning
internetowe wyłudzanie
harassment
start learning
molestowanie
abuse
start learning
nadużycie
piracy
start learning
piractwo
malicious
start learning
złośliwy
alter
start learning
zmieniać
capacity
start learning
zdolność
security flaws
start learning
luki bezpieczeństwa
exploiting
start learning
wykorzystanie
disguised
start learning
przebrany, zamaskowany
embedded
start learning
osadzone
backdoor
start learning
ukryte wejście
ominous
start learning
złowrogi
patching
start learning
łatanie
retrieve
start learning
odzyskać
MAC
start learning
Message- authentication code
Gibberish
start learning
nic nie znaczące dane
Impostor
start learning
Oszust
decipher
start learning
odszyfrować
tenet
start learning
zasada
tamper
start learning
majstrować
incremental backup
start learning
przyrostowa kopii zapasowa
shareware
start learning
oprogramowanie bezpłatnie rozpowszechniane
uninterruptible power supply
start learning
zasilacz awaryjny
compromise
start learning
narazic na szwank
cracked
start learning
pęknięty, wyeksploatowany
encrypt
start learning
Szyfrowanie
firewall
start learning
Zapora
unauthorised
start learning
nieautoryzowane
routine
start learning
rutyna, zwyczaj
trigger
start learning
cyngiel
dormant
start learning
uśpiony
attachment
start learning
załącznik
infiltrate
start learning
przenikać
resident
start learning
rezydent
host
start learning
gospodarz
execution sequence
start learning
kolejność realizacji
scam
start learning
email fraud to obtai e-mail or valuables. Many people believe they have been offered a special gift.
phishing
start learning
bank fraud to get banking information or credit card details
piracy
start learning
illegal copying and distributing files
Malware
start learning
software created to damage or alter computer data
virus
start learning
program attached to excutable files, when infected program is run, THIS propagates to other files on the computer.
Email virus
start learning
spreads by sending a copy of itself to everyone in email address book
Worm
start learning
self-copying program that have capacity to move from one computer to another without human help, by exploiting security flaws. Id doesn't need to be attached to a document or program
trojan
start learning
malicious program disguised as innocent-looking. Once if it is activated it affect computer. It doesn't copy itself and reproduce.
spyware
start learning
software designed to collect information from computer for commercial or criminal puproses
Hijacking
start learning
creating a copy of popular website which shows contents like orgin one, but redirects to unwanted webpage
Salami shaving
start learning
process of draining small amount of money from bank accounts
Denial of service attack
start learning
trying to make computer resources unavailable to its users
Trojan Horse
start learning
it apperars as useful program, but in background it works harmful way
Mail bombing
start learning
sending hudge volume of e-mails in coordinated way- slowing even crashing the server
Piggybacking
start learning
using session estabblished by another user, who didn't log off
Spoofing
start learning
tricking a user into revealing confidential information such as access code or credit card number
Defacing
start learning
process of changing information on another's person's website
payload
start learning
connected with virus it can be message on monitor or something more destructive
jump command
start learning
causes the virus instructions to be executed before the program
misdirection routine
start learning
enable virus to hide itself
reproduction routine
start learning
allows virus to copy itself to other programs
trigger
start learning
causes payload to be activated
gibberish
start learning
meaningless data
decipher
start learning
convert to meaningfull data
tamper
start learning
make unauthorised changes

You must sign in to write a comment