• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back
Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
Computer Security Risk
Any illegal act involving a computer.
Computer Crime
Online or Internet-based illegal acts.
Cybercrime
Someone who accesses a computer or network illegally.
Hacker
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious actions.
Cracker
Someone who has the same intent as a cracker but does not have the techniacl skills or knowledge.
Script Kiddie
People who have excellent computer and networking skills that are hired to break into a specific computer and steal its proprietary data and information.
Corporate Spies
Someone who uses e-mail as a vehicle for extortion.
Cyberextortionist
Programs that act without a user's knowledge and deliberately alter the computer's operations.
Malware
Thge destructive event or prank the program is intended to deliver.
Payload
An organization or person you believe will not send a virus infected file knowingly.
Trusted Source
A group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes.
Botnet
A compromised computer that is being controlled remotely by an outsider.
Zombie
An assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail.
DoS Attack
A program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network.
Back Door
A technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
Spoofing
The use of a computer or network without permission.
Unauthorized Access
The use of a computer or its data for unapproved or possibly illegal activities.
Unauthorized Use
A program that verifies user input is not computer generated.
CAPTCHA
Any item that you must carry to gain access to a computer or a computer facility.
Possessed Object
Authenticates a person's identity by translating a personal characteristic, such as a fingerprint, into a digital code compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
Biometric Device
The discovery, collection, and analysis of evidence found on computers and networks.
Digital Forensics