You are on page 1of 1

3.02 Understand network management.

3.02b Key TermsNetwork Security

3.02b Key Terms Network Security


Term
Virus
Worm
Trojan Horse
Hacker
Phishing
Malware
Spyware
Denial of Service (DoS) or Distributed
Denial of Service (DDoS)
Identity Fraud
Firewall
Antivirus Software
Adware

Botnet

Password
Authentication

Definition
A piece of software that attaches itself to
computer programs; viruses replicate and
typically have a payload
Software that uses computer networks and
security holes to replicate itself.
Computer program hidden within the shell
of another program with an alternative
intent such as a virus.
It is a person who gains unauthorized
access to a computing device or network.
The act of masquerading as a trustworthy
website or email to acquire user
information; identity theft is the intent
It is malicious software meant to gain
access, disrupt computer operation, or
gather sensitive information.
It is a type of malware that collects user
information by tracking the habits of users.
An attempt to make a machine or network
resource unavailable to its intended users.
An attempt to use another person's identity
to commit a crime.
A physical device or application designed
to deny incoming or outgoing traffic on a
network.
Application used to prevent infection from
risks.
Advertising software that automatically
generates advertisements. It can be
legitimately developed software but in
some cases it can pose a threat.
A collection of internet-connected
programs communicating with other similar
programs in order to perform tasks.
Botnets can be used to send spam or
participate in a Distributed Denial of
Service attacks.
A string of characters that allows access to
a computer, interface, or system.
The process of verifying that "you are who
you say you are"

You might also like