Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
21 Cards in this Set
- Front
- Back
Trusted Source
|
organization or person you believe will not send a virus infected file knowingly.
|
|
Botnet
|
group of compromised computers connected to a network such as the INternet that are used as part of a network that attacks other networks.
|
|
Zombie
|
computer whose owner is unaware the computer is being controlled remotely by an outsider.
|
|
DoS Attack
|
Denial of Service, assault whose purpose is to disrupt computer access to an Internet Service.
|
|
Back door
|
program or set of instructions in a program that allows users to bypass security controls.
|
|
Spoofing
|
intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
|
|
Unauthorized Use
|
use of a computer or its data for unapproved or possibly illegal activites.
|
|
Unauthorized Access
|
Use of a computer or network without permission.
|
|
CAPTCHA
|
program that verifies user input is not computer generated.
|
|
Possessed Object
|
item you must carry to gain access to a computer or computer facility
|
|
Biometric Device
|
authenticates a person's identity by translating a personal characteristic.
|
|
Digital Forensics
|
Discovery, collection, and analysis of evidence found on computers and networks.
|
|
Computer Security Risk
|
any event or action that could cause a loss or damage to computer hardware, software,data,information, or processing capability
|
|
Computer Crime
|
any illegal act involving a computer.
|
|
Cybercrime
|
online or Internet based illegal acts
|
|
Hacker
|
originally complimentary word for a computer enthusiast, now has derogatory meaning and refers to someone who accesses a computer or network illegally.
|
|
Cracker
|
accesses a computer or network illegally but has interest of destroying data, stealing information, or other malicious acts.
|
|
Script kiddie
|
same intent as a cracker but doesn't have technical skills and knowledge.
|
|
Corporate Spies
|
hired to break into a specific computer and steal its proprietary data and information
|
|
cyberextortionist
|
someone who uses e-mail as a vehicle for extortion
|
|
malware
|
programs that act without a user's knowledge and deliberately alter the computer's operations.
|