• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/16

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

16 Cards in this Set

  • Front
  • Back
computer security risk
event or action that could cause damage to computer
computer crime
illegal computer acts
cybercrime
online or internet based illegal acts
hacker
someone who accesses a computer or network illegally
cracker
someone who destroys data, steals info, etc.
script kiddie
uses prewritten hacking and cracking programs to break into computers
corporate spies
have skills in computers and networking, test computer stability
cyberextortionist
uses e-mail for extortion
malware
(malicious software) programs that act without users knowledge, alter computer operations
payload
the destructive event intended to be delivered
trusted source
organization or person you know wont send a virus
botnet
group of compromised computers connected to network attacking other networks
zombie
compromised user
Dos attack
(denial of service) disrupts computer access to internet service
back door
allows users to bypass security controls when accessing program, computer, or network
spoofing
technique used to make network or transmission seem legitimate