• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back

is a program that claims to rid your computer of viruses but instead introduces viruses-onto your computer.

Trojan Horse

is some one who breaks into someone else computer

Cracking

use a computer to gain unauthorized access to data in a system.

Hacking

a person who uses existing computer scripts or code to hack into computers, lacking the expertise to write their own.
Script Kiddies
The theft of trade secrets by the removal, copying or recording of confidential or valuable information in a company for use by a competitor.
Corporate Spies
lacking moral principles; unwilling to adhere to proper rules of conduct.
Unethical Employees
A crime in which payment is demanded in order to prevent or stop attacks on an organization's Web site, network or computer systems.
Cyber-extortionists
is any "premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.
Cyber-terrorists
is a group of compromised computers connected to a network
botnet
disrupts computer access to Internet services
denial of service attack (DoS attack)