Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
16 Cards in this Set
- Front
- Back
computer security risk
|
event or action that could cause damage to computer
|
|
computer crime
|
illegal computer acts
|
|
cybercrime
|
online or internet based illegal acts
|
|
hacker
|
someone who accesses a computer or network illegally
|
|
cracker
|
someone who destroys data, steals info, etc.
|
|
script kiddie
|
uses prewritten hacking and cracking programs to break into computers
|
|
corporate spies
|
have skills in computers and networking, test computer stability
|
|
cyberextortionist
|
uses e-mail for extortion
|
|
malware
|
(malicious software) programs that act without users knowledge, alter computer operations
|
|
payload
|
the destructive event intended to be delivered
|
|
trusted source
|
organization or person you know wont send a virus
|
|
botnet
|
group of compromised computers connected to network attacking other networks
|
|
zombie
|
compromised user
|
|
Dos attack
|
(denial of service) disrupts computer access to internet service
|
|
back door
|
allows users to bypass security controls when accessing program, computer, or network
|
|
spoofing
|
technique used to make network or transmission seem legitimate
|