• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
computer securtiy risk
Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
computer crime
any illegal act involving a computer.
cybercrime
Online or Internet-based illegal acts.
hacker
Someone who accesses a computer or network illegally
cracker
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action.
script kiddie
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action but does not have the technical skills and knowledge.
trusted source
Company or person a user believes will not send a virus-infected file knowingly.
cyberextortionist
Someone who uses e-mail as a vehicle for extortion.
malware
Short for malicious software; programs that act without a user's knowledge and deliberately alter a computer's operations.
payload
Destructive event or prank a malicious-logic program is intended to deliver.
botnet
Group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes. See also zombie army.
zombie
A compromised computer whose owner is unaware the computer is being controlled remotely by an outsider.
DOS attack
Assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. Also called denial of service attack.
backdoor
Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
spoofing
Technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
unauthorized use
Use of a computer or its data for unapproved or possibly illegal activities.
unsuthorized access
use of a computer or network without permission.
CAPTCHA
Completely Automated Public Turing test to tell Computers and Humans Apart; program used by some Web sites to provide further protection for a user's password by verifying that user input is not computer generated.
possessed object
Any item that a user must carry to gain access to a computer or computer facility.
biometric device
Device that authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic.