Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
22 Cards in this Set
- Front
- Back
Computer Security Risk
|
is any event that could cause a loss or damage to computer hardware, software, or data
|
|
computer crime
|
any illegal act involving a computer
|
|
Cybercrime
|
online or internet baased illegal acts
|
|
hacker
|
computer enthusiast/ someone who accesses a computer network illegally
|
|
cracker
|
accesses a network illegally with the intent to destroy
|
|
script kindle
|
has same intent as a cracker but does not have the skills to do it
|
|
corporate spies
|
break into other companies and steal ideas
|
|
Cyberextortionists
|
someone who uses email as a way for extortion
|
|
Malware
|
acts without users knowledge and goes after the computers operations
|
|
Payload
|
destructive event or prank the program has intended to deliver
|
|
Trusted source
|
an organization or person you know who will not send a virus infected file knowingly
|
|
botnet
|
a group of compromised computers connected to a network and used to attack other computers
|
|
zombie
|
a compromised computer
|
|
DoS Attack
|
denial of service attack- purpose is to disrupt computer access
|
|
Back door
|
a program that lets users bypass security controls when accessing a program
|
|
spoofing
|
intruders use it to make their network seem and look legit
|
|
Unauthorized Use
|
use of a computer or data for unapproved or possibly illegal activities
|
|
Unauthorized access
|
use of a computer or network without permission
|
|
CAPTCHA
|
completely automated public turing test to tell computers and humans apart- verifies user input is not a computer
|
|
Possessed Object
|
any item you must carry to gain access to a computer or computer facility
|
|
Biometric device
|
translates personal characterizations and gives authorization
|
|
Digital Forensics
|
disovery collection and analysis of evidence on a computer
|