• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back
Computer Security Risk
Any event or action that could cause a loss of or damage to computer hardware, software, data, information or processing capability.
Computer Crime
Any illegal act involving a computer.
Cybercrime
Online or internet-based illegal act.
Hacker
Refers to someone who accesses a computer or network illegally.
Cracker
Someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action.
Script Kiddie
Has the same intent as a cracker but does not have the technical skills and knowledge.
Corporate Spies
People that have excellent computer and networking skills that are hired to break into a specific computer and steal its proprietary information and data.
Cyberextortionist
Someone who uses e-mail as a vehicle for extortion. Sends an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organizations network.
Malware
(Malicious Software) Programs that act without a user's knowledge and deliberately alter the computer's operations.
Payload
The destructive event or prank Malware is intended to deliver.
Trusted Source
An organization or person you believe will no send a virus infected file knowingly.
Botnet
A group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes.
Zombie
One whose owner is unaware the computer is being controlled remotely by an outsider.
Dos Attack
(Denial of Service)
An assault whose purpose is to disrupt computer access to an internet service such as the web or e-mail.
Back Door
A program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network.
Spoofing
A technique intruders use to make their network or internet transmissions appear legitimate to a victim computer or network.
Unauthorized use
The use of a computer or its data for unapproved or possibly illegal activities.
Unauthorized Access
The use of a computer or network without permission.
CAPTCHA
(Completely Automated Public Turing test to tell Computers and Humans Apart) Program that verifies user input is not computer generated.
Possessed Object
Any item that you must carry to gain access to a computer or computer facility.
Biometric Device
Authenticates a person;s identity by translating a personal characteristic such as a fingerprint into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristics.
Digital Forensics
Computer forensics, network forensics, cyber forensics, is the discovery, collection, and analysis of evidence found on computers or networks.