• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back
Computer Security Risk
is any event that could cause a loss or damage to computer hardware, software, or data
computer crime
any illegal act involving a computer
Cybercrime
online or internet baased illegal acts
hacker
computer enthusiast/ someone who accesses a computer network illegally
cracker
accesses a network illegally with the intent to destroy
script kindle
has same intent as a cracker but does not have the skills to do it
corporate spies
break into other companies and steal ideas
Cyberextortionists
someone who uses email as a way for extortion
Malware
acts without users knowledge and goes after the computers operations
Payload
destructive event or prank the program has intended to deliver
Trusted source
an organization or person you know who will not send a virus infected file knowingly
botnet
a group of compromised computers connected to a network and used to attack other computers
zombie
a compromised computer
DoS Attack
denial of service attack- purpose is to disrupt computer access
Back door
a program that lets users bypass security controls when accessing a program
spoofing
intruders use it to make their network seem and look legit
Unauthorized Use
use of a computer or data for unapproved or possibly illegal activities
Unauthorized access
use of a computer or network without permission
CAPTCHA
completely automated public turing test to tell computers and humans apart- verifies user input is not a computer
Possessed Object
any item you must carry to gain access to a computer or computer facility
Biometric device
translates personal characterizations and gives authorization
Digital Forensics
disovery collection and analysis of evidence on a computer