Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
53 Cards in this Set
- Front
- Back
Trusted Source
|
organization or person you believe will not send a virus infected file knowingly.
|
|
Botnet
|
group of compromised computers connected to a network such as the INternet that are used as part of a network that attacks other networks.
|
|
Zombie
|
computer whose owner is unaware the computer is being controlled remotely by an outsider
|
|
DoS Attack Denial of Service
|
assault whose purpose is to disrupt computer access to an Internet Service.
|
|
Back door
|
program or set of instructions in a program that allows users to bypass security controls.
|
|
Spoofing
|
intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
|
|
Unauthorized Use
|
use of a computer or its data for unapproved or possibly illegal activites.
|
|
Unauthorized Access
|
Use of a computer or network without permission.
|
|
CAPTCHA
|
program that verifies user input is not computer generated.
|
|
Computer Security Risk
|
ny event or action that could cause a loss or damage to computer hardware, software,data,information, or processing capability
|
|
Computer Crime
|
any illegal act involving a computer.
|
|
Cybercrime online
|
or Internet based illegal acts Edit
Hacker originally complimentary word for a computer enthusiast, now has derogatory meaning and refers to someone who accesses a computer or network illegally |
|
Cracker
|
accesses a computer or network illegally but has interest of destroying data, stealing information, or other malicious acts. Edit
Script kiddie same intent as a cracker but doesn't have technical skills and knowledge. |
|
Corporate Spies
|
hired to break into a specific computer and steal its proprietary data and information
|
|
malware
|
programs that act without a user's knowledge and deliberately alter the computer's operations.
|
|
hacker
|
a derogatory meaning and refers to someone who accesses a computer or network illegally
|
|
script kiddie
|
has the same intent as a cracker but does not have the technicle skills and knowledge
|
|
cyberextortionist
|
someone who uses e-mmail as a vehicle for extortion
|
|
cyberterrorist
|
someone who uses the internet or network to destroy or damage computers for poltical reasons
|
|
virus
|
a potentionally damaging computer program that affects, or infects, a computer negatively by altering the way that the computer works without the user's permission
|
|
worm
|
a program that copies itself repeatedly, for example in memory or on network, using up resources and possibly shutting down the computer
|
|
Trojan Horse
|
a program that hides within or looks like a legit program
|
|
rookit
|
a program that hides in a computer and allows someone from a remote location to take full control of the computer
|
|
payload
|
the destructive event or prank the prgram is intended to deliver
|
|
virus signature
|
a known specific patern of virus code
|
|
firewall
|
hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet
|
|
personal firewall
|
a utility program that detects and protects a personal computer and its data from unauthorized intrusions
|
|
Intrusion Detection Software
|
automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access, and notifies network administrators or suspicious behavior patterns or system breaches
|
|
user name
|
a unique combination of characters, such as letters or numbers, that identifies one specific user
|
|
password
|
a private combination or characters associated with the user name that allows access to certain computer resources
|
|
hardware theft
|
the act of stealing computer equipment
|
|
real time location system
|
to track and identify the location of high-risk or high-value items
|
|
Software theft
|
occurs when someone steals software media, intentionally arases programs,illegally copies programs, or illegally registers and/or activates a program
|
|
Information Theft
|
occurs when someone steals personal or conidential information
|
|
Encryption
|
the process of converting readable data into unreadable characters to prevent unauthorized access
|
|
digital signature
|
an encrypted code that a person, Web Site, or organizations attaches to an electronic message to verify the identity of the message sender.
|
|
digital certificate
|
is a notice that guarentees a user o a Web site is legit
|
|
system failure
|
the prolonged malfuntion of a computer
|
|
surege protector
|
uses special electrical components to provide a stable current flow to the computer and other electronic equipment
|
|
backup
|
a duplicate of a file, program, or disk that can be used if the original is lost
|
|
repetitive strain injury
|
an injury oth the muscles, tendons, ligaments, and joints
|
|
Computer Ethics
|
the moral guidelines that govern the use of computer and information systems
|
|
copyright
|
gives authors and artists exclusive rights to duplicate, publish, and sell their materials
|
|
Green Computing
|
involves reducing the electricity and enviromental waste while using a computer
|
|
ENERGY STAR program
|
to help reduce the amount of electricity used by computers and related devices
|
|
Information privacy
|
refers to the right of individuals and companies to deny or restrict the collection and use of information about them
|
|
cookie
|
a small text file that a Web server stores on your computer
|
|
Spyware
|
a program placed on a computer without the user's peermission that secretly collects information about the user
|
|
spam
|
an unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once
|
|
phishing
|
a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information
|
|
social engineering
|
defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims.
|
|
employee monitoring
|
inolves the use of computers to observe, record, and review an employee's user of a computer
|
|
content filtering
|
the process of restricting access to certain material on the Web
|