Security technology terms

Card Set Information

Security technology terms
2012-05-08 16:49:49

Security technology terms for security certification
Show Answers:

  1. Security alert vectors bot
    Software app that runs automated tasks over the Internet. Can be used for automated and coordinated attack on network computers (one example idose nail of service DOS attach
  2. securalert track vectors bot herder (bot master)
    mars herder is a crackewho a uses automatEd techniques to scan specific network ranges and find vulnerable systems on which toinstall their bots. Theinfected machine then becomes one ofMann zombies in a bot net that responds to commands given by the bot herder usually by intent relay chat command
  3. SecuritySecurity attack vector. Denial of service
    an attempt to make a computer ornetwork resource unavailable yo it's intended users. Typically this is done bytemporarily or indefinitely interrusector suspend services of a host computer on the network
  4. secutiryservicesecurit attack vectors. Exploit
    A piece of software, a chunk of data or sequence of commands that take advantage of a bug or glitch or vulnerability in order to cause unintended behavior to occur on computer software. This typically includes gainingcontrol of a computer system or allowing privelageescalation or DOS
  5. Security alert verotors hacker
    someone who accesses a computer system by circumventing it's security system
  6. security alert vector. Honeypots
    A trap to fight unauthorized computer access
  7. securityalerts vectors malware
    So software used to disrupt computer operation or gaina unauthorized access to computer systems can also be a script or a code
  8. security alert vectors phising
    sending an email to a user falsely claiming to be an established legit source in an attempt to cam the useinfo to surrending spi
  9. security alert vector SnifferAPI
    packet analyzer computer software or hardware that can intercept and log traffic passing over a digital network
  10. security alert vector. SPAM
    Use of electronic mestaging to send unsolicited bulk messages indisremently
  11. Security attack vectors. Smurf attack
    a way of generating signitraffic computer network traffic. A type of dos atackthatfloods a system via spoofed broadcast ping messages
  12. Security attack vectors. SQL injection
    A technique to attack databases through a website. Done by including portions of SQL statementsIna a web forM entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database
  13. security attack injection. Targeted attack
  14. security attack vector. Trojan
    a program with benign capabilities that conceal another malicious program
  15. security attack vector. XML coding
  16. security attack vectors. Worm
    a standalone malware computer program that replicates itself in order to spread to other computers
  17. security atTack vectors zero day
    a computer threat TNT tries to exploit computer application vulnerabilities that are unknown to others or software developers