100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

INSY 2303 (UTA) EXAM 3 SUMMARISED NOTES

Rating
-
Sold
-
Pages
4
Grade
A+
Uploaded on
13-02-2025
Written in
2024/2025

Encryption* - The process of scrambling or hiding information so that it cannot be understood without the key necessary to change it back into its original form. AES* - (Advanced Encryption Standard) An encryption standard based on the Rijndael encryption algorithm that uses multiple steps to encrypt data. Malware* - Programs such as viruses, worms, and bots designed to disrupt computer operations. Computer Virus* - A program designed to attach itself to a file, reproduce, destroy data, display an irritating message, or otherwise disrupt computer operations.

Show more Read less
Institution
INSY 2303
Course
INSY 2303








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
INSY 2303
Course
INSY 2303

Document information

Uploaded on
February 13, 2025
Number of pages
4
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

INSY 2303 (UTA) EXAM 3 SUMMARISED
NOTES
Encryption* - The process of scrambling or hiding information so that it cannot be
understood without the key necessary to change it back into its original form.

AES* - (Advanced Encryption Standard) An encryption standard based on the Rijndael
encryption algorithm that uses multiple steps to encrypt data.

Malware* - Programs such as viruses, worms, and bots designed to disrupt computer
operations.

Computer Virus* - A program designed to attach itself to a file, reproduce, destroy data,
display an irritating message, or otherwise disrupt computer operations.

Rootkit* - Software that conceals running processes; used by hackers to disguise
security breaches and break-ins.

Computer Worm* - A software program designed to enter a computer system, usually a
network, through security "holes" and then replicate itself and spread to other devices.

Internet Worm* - A type of malware that spreads over the Internet, usually by sending
itself to random IP addresses.

Trojan* - A computer program that appears to perform one function while actually doing
something else, such as inserting a virus into a computer system or stealing a
password.

Antivirus Software* - A computer program used to identify, isolate, and eliminate viruses
by scanning files as they arrive, leave, or are executed.

Heuristic Analysis* - In the context of antivirus software, the process of identifying
malware based not on a signature, but on other factors, such as context and behavior.

Ransomware* - Malware that encrypts files as part of an exploit to extort money from
victims who want to regain use of their files in unencrypted format.

Botnet* - A group of bots under the remote control of a botmaster, used to distribute
spam and denial-of-service attacks.

Firewall* - Software or hardware designed to analyze and control incoming and
outgoing packets on a network; used to enhance security by filtering out potential
intrusion attempts.
$12.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
ammon

Get to know the seller

Seller avatar
ammon Glendale Community College
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
1 year
Number of followers
0
Documents
42
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions