security

5  1    66 schede    fiszkotekaa123
Scarica mp3 Stampa Gioca Testa il tuo livello
 
Domanda Risposta
cracker/ black-hat hacker
inizia ad imparare
"przestępca komputerowy" xD
virus propagation
inizia ad imparare
rozmnażanie, namnożenie się wirusów
fraud
inizia ad imparare
oszustwo
scam
inizia ad imparare
przekręt
phishing
inizia ad imparare
internetowe wyłudzanie
harassment
inizia ad imparare
molestowanie
abuse
inizia ad imparare
nadużycie
piracy
inizia ad imparare
piractwo
malicious
inizia ad imparare
złośliwy
alter
inizia ad imparare
zmieniać
capacity
inizia ad imparare
zdolność
security flaws
inizia ad imparare
luki bezpieczeństwa
exploiting
inizia ad imparare
wykorzystanie
disguised
inizia ad imparare
przebrany, zamaskowany
embedded
inizia ad imparare
osadzone
backdoor
inizia ad imparare
ukryte wejście
ominous
inizia ad imparare
złowrogi
patching
inizia ad imparare
łatanie
retrieve
inizia ad imparare
odzyskać
MAC
inizia ad imparare
Message- authentication code
Gibberish
inizia ad imparare
nic nie znaczące dane
Impostor
inizia ad imparare
Oszust
decipher
inizia ad imparare
odszyfrować
tenet
inizia ad imparare
zasada
tamper
inizia ad imparare
majstrować
incremental backup
inizia ad imparare
przyrostowa kopii zapasowa
shareware
inizia ad imparare
oprogramowanie bezpłatnie rozpowszechniane
uninterruptible power supply
inizia ad imparare
zasilacz awaryjny
compromise
inizia ad imparare
narazic na szwank
cracked
inizia ad imparare
pęknięty, wyeksploatowany
encrypt
inizia ad imparare
Szyfrowanie
firewall
inizia ad imparare
Zapora
unauthorised
inizia ad imparare
nieautoryzowane
routine
inizia ad imparare
rutyna, zwyczaj
trigger
inizia ad imparare
cyngiel
dormant
inizia ad imparare
uśpiony
attachment
inizia ad imparare
załącznik
infiltrate
inizia ad imparare
przenikać
resident
inizia ad imparare
rezydent
host
inizia ad imparare
gospodarz
execution sequence
inizia ad imparare
kolejność realizacji
scam
inizia ad imparare
email fraud to obtai e-mail or valuables. Many people believe they have been offered a special gift.
phishing
inizia ad imparare
bank fraud to get banking information or credit card details
piracy
inizia ad imparare
illegal copying and distributing files
Malware
inizia ad imparare
software created to damage or alter computer data
virus
inizia ad imparare
program attached to excutable files, when infected program is run, THIS propagates to other files on the computer.
Email virus
inizia ad imparare
spreads by sending a copy of itself to everyone in email address book
Worm
inizia ad imparare
self-copying program that have capacity to move from one computer to another without human help, by exploiting security flaws. Id doesn't need to be attached to a document or program
trojan
inizia ad imparare
malicious program disguised as innocent-looking. Once if it is activated it affect computer. It doesn't copy itself and reproduce.
spyware
inizia ad imparare
software designed to collect information from computer for commercial or criminal puproses
Hijacking
inizia ad imparare
creating a copy of popular website which shows contents like orgin one, but redirects to unwanted webpage
Salami shaving
inizia ad imparare
process of draining small amount of money from bank accounts
Denial of service attack
inizia ad imparare
trying to make computer resources unavailable to its users
Trojan Horse
inizia ad imparare
it apperars as useful program, but in background it works harmful way
Mail bombing
inizia ad imparare
sending hudge volume of e-mails in coordinated way- slowing even crashing the server
Piggybacking
inizia ad imparare
using session estabblished by another user, who didn't log off
Spoofing
inizia ad imparare
tricking a user into revealing confidential information such as access code or credit card number
Defacing
inizia ad imparare
process of changing information on another's person's website
payload
inizia ad imparare
connected with virus it can be message on monitor or something more destructive
jump command
inizia ad imparare
causes the virus instructions to be executed before the program
misdirection routine
inizia ad imparare
enable virus to hide itself
reproduction routine
inizia ad imparare
allows virus to copy itself to other programs
trigger
inizia ad imparare
causes payload to be activated
gibberish
inizia ad imparare
meaningless data
decipher
inizia ad imparare
convert to meaningfull data
tamper
inizia ad imparare
make unauthorised changes

Devi essere accedere per pubblicare un commento.