• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/53

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

53 Cards in this Set

  • Front
  • Back
Trusted Source
organization or person you believe will not send a virus infected file knowingly.
Botnet
group of compromised computers connected to a network such as the INternet that are used as part of a network that attacks other networks.
Zombie
computer whose owner is unaware the computer is being controlled remotely by an outsider
DoS Attack Denial of Service
assault whose purpose is to disrupt computer access to an Internet Service.
Back door
program or set of instructions in a program that allows users to bypass security controls.
Spoofing
intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
Unauthorized Use
use of a computer or its data for unapproved or possibly illegal activites.
Unauthorized Access
Use of a computer or network without permission.
CAPTCHA
program that verifies user input is not computer generated.
Computer Security Risk
ny event or action that could cause a loss or damage to computer hardware, software,data,information, or processing capability
Computer Crime
any illegal act involving a computer.
Cybercrime online
or Internet based illegal acts Edit
Hacker originally complimentary word for a computer enthusiast, now has derogatory meaning and refers to someone who accesses a computer or network illegally
Cracker
accesses a computer or network illegally but has interest of destroying data, stealing information, or other malicious acts. Edit
Script kiddie same intent as a cracker but doesn't have technical skills and knowledge.
Corporate Spies
hired to break into a specific computer and steal its proprietary data and information
malware
programs that act without a user's knowledge and deliberately alter the computer's operations.
hacker
a derogatory meaning and refers to someone who accesses a computer or network illegally
script kiddie
has the same intent as a cracker but does not have the technicle skills and knowledge
cyberextortionist
someone who uses e-mmail as a vehicle for extortion
cyberterrorist
someone who uses the internet or network to destroy or damage computers for poltical reasons
virus
a potentionally damaging computer program that affects, or infects, a computer negatively by altering the way that the computer works without the user's permission
worm
a program that copies itself repeatedly, for example in memory or on network, using up resources and possibly shutting down the computer
Trojan Horse
a program that hides within or looks like a legit program
rookit
a program that hides in a computer and allows someone from a remote location to take full control of the computer
payload
the destructive event or prank the prgram is intended to deliver
virus signature
a known specific patern of virus code
firewall
hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet
personal firewall
a utility program that detects and protects a personal computer and its data from unauthorized intrusions
Intrusion Detection Software
automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access, and notifies network administrators or suspicious behavior patterns or system breaches
user name
a unique combination of characters, such as letters or numbers, that identifies one specific user
password
a private combination or characters associated with the user name that allows access to certain computer resources
hardware theft
the act of stealing computer equipment
real time location system
to track and identify the location of high-risk or high-value items
Software theft
occurs when someone steals software media, intentionally arases programs,illegally copies programs, or illegally registers and/or activates a program
Information Theft
occurs when someone steals personal or conidential information
Encryption
the process of converting readable data into unreadable characters to prevent unauthorized access
digital signature
an encrypted code that a person, Web Site, or organizations attaches to an electronic message to verify the identity of the message sender.
digital certificate
is a notice that guarentees a user o a Web site is legit
system failure
the prolonged malfuntion of a computer
surege protector
uses special electrical components to provide a stable current flow to the computer and other electronic equipment
backup
a duplicate of a file, program, or disk that can be used if the original is lost
repetitive strain injury
an injury oth the muscles, tendons, ligaments, and joints
Computer Ethics
the moral guidelines that govern the use of computer and information systems
copyright
gives authors and artists exclusive rights to duplicate, publish, and sell their materials
Green Computing
involves reducing the electricity and enviromental waste while using a computer
ENERGY STAR program
to help reduce the amount of electricity used by computers and related devices
Information privacy
refers to the right of individuals and companies to deny or restrict the collection and use of information about them
cookie
a small text file that a Web server stores on your computer
Spyware
a program placed on a computer without the user's peermission that secretly collects information about the user
spam
an unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once
phishing
a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information
social engineering
defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims.
employee monitoring
inolves the use of computers to observe, record, and review an employee's user of a computer
content filtering
the process of restricting access to certain material on the Web