• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/21

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

21 Cards in this Set

  • Front
  • Back
Trusted Source
organization or person you believe will not send a virus infected file knowingly.
Botnet
group of compromised computers connected to a network such as the INternet that are used as part of a network that attacks other networks.
Zombie
computer whose owner is unaware the computer is being controlled remotely by an outsider.
DoS Attack
Denial of Service, assault whose purpose is to disrupt computer access to an Internet Service.
Back door
program or set of instructions in a program that allows users to bypass security controls.
Spoofing
intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
Unauthorized Use
use of a computer or its data for unapproved or possibly illegal activites.
Unauthorized Access
Use of a computer or network without permission.
CAPTCHA
program that verifies user input is not computer generated.
Possessed Object
item you must carry to gain access to a computer or computer facility
Biometric Device
authenticates a person's identity by translating a personal characteristic.
Digital Forensics
Discovery, collection, and analysis of evidence found on computers and networks.
Computer Security Risk
any event or action that could cause a loss or damage to computer hardware, software,data,information, or processing capability
Computer Crime
any illegal act involving a computer.
Cybercrime
online or Internet based illegal acts
Hacker
originally complimentary word for a computer enthusiast, now has derogatory meaning and refers to someone who accesses a computer or network illegally.
Cracker
accesses a computer or network illegally but has interest of destroying data, stealing information, or other malicious acts.
Script kiddie
same intent as a cracker but doesn't have technical skills and knowledge.
Corporate Spies
hired to break into a specific computer and steal its proprietary data and information
cyberextortionist
someone who uses e-mail as a vehicle for extortion
malware
programs that act without a user's knowledge and deliberately alter the computer's operations.