Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
22 Cards in this Set
- Front
- Back
Computer Security Risk
|
Any event or action that could cause a loss of or damage to computer hardware, software, data, information or processing capability.
|
|
Computer Crime
|
Any illegal act involving a computer.
|
|
Cybercrime
|
Online or internet-based illegal act.
|
|
Hacker
|
Refers to someone who accesses a computer or network illegally.
|
|
Cracker
|
Someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action.
|
|
Script Kiddie
|
Has the same intent as a cracker but does not have the technical skills and knowledge.
|
|
Corporate Spies
|
People that have excellent computer and networking skills that are hired to break into a specific computer and steal its proprietary information and data.
|
|
Cyberextortionist
|
Someone who uses e-mail as a vehicle for extortion. Sends an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organizations network.
|
|
Malware
|
(Malicious Software) Programs that act without a user's knowledge and deliberately alter the computer's operations.
|
|
Payload
|
The destructive event or prank Malware is intended to deliver.
|
|
Trusted Source
|
An organization or person you believe will no send a virus infected file knowingly.
|
|
Botnet
|
A group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes.
|
|
Zombie
|
One whose owner is unaware the computer is being controlled remotely by an outsider.
|
|
Dos Attack
|
(Denial of Service)
An assault whose purpose is to disrupt computer access to an internet service such as the web or e-mail. |
|
Back Door
|
A program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network.
|
|
Spoofing
|
A technique intruders use to make their network or internet transmissions appear legitimate to a victim computer or network.
|
|
Unauthorized use
|
The use of a computer or its data for unapproved or possibly illegal activities.
|
|
Unauthorized Access
|
The use of a computer or network without permission.
|
|
CAPTCHA
|
(Completely Automated Public Turing test to tell Computers and Humans Apart) Program that verifies user input is not computer generated.
|
|
Possessed Object
|
Any item that you must carry to gain access to a computer or computer facility.
|
|
Biometric Device
|
Authenticates a person;s identity by translating a personal characteristic such as a fingerprint into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristics.
|
|
Digital Forensics
|
Computer forensics, network forensics, cyber forensics, is the discovery, collection, and analysis of evidence found on computers or networks.
|