Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
39 Cards in this Set
- Front
- Back
- 3rd side (hint)
Adware
|
software installed on a computer that produces pop up ads using your browser;the ads are often based on your browser habits
|
produces pop up ads
|
|
anti spyware software
|
software used to remove spyware and adware
|
remove spyware and adware
|
|
antivirus (Av) software
|
utility programs that prevent infection or scan a system to detect and remove viruses.
|
McAFee Associates and Norton Antivirus
|
|
ATA Secure Erase
|
(ANSI) standerd. dictates how to securely erase data from solid state drive (USB) or SSD drive in order to protect personal privacy
|
standard of erasing to protect personal privacy
|
|
biometric device
|
an input device that inputs biological data about a person;the data can identify a person's fingerprints, handprints, face, voice, eyes and handwriting
|
can identify you by fingerprint, face, Voice, eyes,handwriting
|
|
Bitlocker Encryption
|
A utility in Windows 7/Vista Ultimate and Enterprise editions that is used to lock down a hard drive by encrypting the entire Windows volume and and others on the drive
|
encryption lock down for Windows7/Vista
|
|
boot sector virus
|
An infectious program that can replace the boot program with a modified, infected version, often causing boot and data retrieval problems
|
virus that effects boot program,causes boot and data retrieval problems
|
|
computer infestation
|
unwanted program that is transmitted to a computer without the user knowledge
|
also called malicious software
|
|
degausser
|
a machine that exposes a storage device to a strong magnetic field to completely erase the data on a magnetic hard drive or tape drive
|
strong magnetic field to erase data
|
|
digital certificate
|
A code used to authenticate the source of a file or document or to identify and authenticate a person or organization sending data over a network. includes a public key for encryption. ( also called digital ID digital signature)
|
authenticate the source of a file, doc. person. or organization, includes public key
|
|
email hoax
|
An email message that is trying to tempt you to give out personal information or trying to scam you
|
a scam
|
|
Encrypted File System (EFS)
|
A way to use a key to encode a file or folder on a NTFS volume to protect sensitive data. Because it's a integrated system service EFS is transparent to users and applications
|
uses a key to encode a file or folder on NTFS volume to protect, transports to users and applications
|
|
grayware
|
A program that AV software recognizes to be potentially unwanted or potential harmful
|
could be potentially unwanted or harmful
|
|
malicious software
|
Any unwanted program that is transmitted to a computer without the users knowledge and is designed to data and software. Types of of infestation include viruses, Trojan horses,worms, adware, spyware, keyloggers, browser hijackers, dialers and downloadeds.
|
unwanted programs that are transmitted to your computer without your knowledge
|
|
keylogger
|
A type of spyware that tracks your keystrokes,including password, chat room sessions, email messages,documents, online purchases, and anything else you type on your PC. Text is logged to a text file and transmitted over the internet without your knowledge
|
spyware that tracks your privacy through your keystrokes and is transmitted over the internet without your knowledge
|
|
phishing (1)
|
(1) A type of identity theft where a person is baited into giving personal data to a website of a reputable company with which the person has an account
|
baited into giving personal data to a website of a reputable company that you have an account with
|
|
Phishing (2)
|
(2) sending an email message with the intent of getting the user to reveal private information that can be used for identity theft
|
sending a email to bait user to reveal private information
|
|
privacy filter
|
A device that fits over a monitor screen to prevent other people from viewing the monitor from a web angle
|
fits over monitor screen to prevent people from viewing the monitor from a web angle
|
|
quarantined computer
|
A computer that is suspected of infection and is not allowed to use the network, is put on a different network dedicated to quarantined computers, or is only allowed to access only certain network resources
|
computer suspected of infection, not allowed in the network, or only allowed certain network resources
|
|
retinal scanning
|
part of the authentication process, some systems use biometric data by scanning the blood vessels behind the eye and considered the most reliable of all biometric data scanning
|
part of the authentication process, scan eyes, most reliable
|
|
RFID badge
|
a badge worn by an employee used to gain entrance into a locked area of a building. A Radio Frequency Identification token transmite authentication to the system when the token gets in range of quary device
|
a badge that gives employees entrance to a locked area in a building. Uses a Radio frequency identification token to the system when token is in range
|
|
Rootkit
|
A type of malicious software that load itself before the OS boot is complete and can hijack internal Windows component so that it masks information that Windows provides to usermode utilities such as Windows Explorer or task manager
|
malicious software that loads before Os boots and can hijack internal windows components, masks information such as Windows Explorer or task manager
|
|
RSA tokens
|
A type of smart card that contains authentication information
|
used in smart card
|
|
Security center
|
a center in vista where you can confirm Windows Firewall, Windows update, anti-malware settings, includes that of Windows defender, and other security settings
|
in vista, confirms Windows firewall and updates, Windows Defender, anti-malware and security settings
|
|
shoulder surfing
|
where other people secretly peek at your monitor as you work to gain valuable information
|
people secretly peek at your monitor as your working to gain information
|
|
smart card
|
any device that contains authentication information that can be keyed into a logon window to read by a reader to authenticate a user on a network
|
can be keyed into a logon window or read by a reader to authenticate user in the network
|
|
smart card Reader
|
a device that can read a smart card used to authenticate a person on a network
|
device that can read smart to authenticate user on a network
|
|
spyware
|
malicious software that installs itself on your computer to spy on you. It collects personal information about you and it transmits over the internet to web hosting sites that intend to use your personal data for harm
|
malicious software that spys on you and sends your personal information to web hosting sites that harm you
|
|
social engineering
|
The practice of tricking people into giving out personal information or allowing unsafe programs into the network or computer
|
practice of tricking people
|
|
strong password
|
a password that isn't easy to guess
|
hard to guess it
|
|
tailgating
|
When someone who is unauthorized follow the employee through a secure area or room or building
|
following an employee to gain entrance to secure area or room
|
|
Trojan
|
a type of malware that tricks you into opening it by substituting itself for a legitimate program
|
malware that tricks you, substituting itself for a legitimate program
|
|
virus
|
a program that often has an incubation period, is infectious and is intended to cause damage. A virus program might destroy data and program might or damage a disk drive boot sector
|
has an incubation period, infectious, might destroy data and program or disk drive sector
|
|
virus definition
|
a set of characteristics of a virus and is used by antivirus software to identify new viruses as they get into the wild
|
antivirus software uses virus characteristics to stop virus add they get out
|
|
Virus signature
|
refer to virus definition
|
think virus definition
|
|
virus signature
|
refer to virus definition
|
think virus definition
|
|
Windows Defender
|
antispyware utility included in Windows 7/Vista
|
used in only 7/vista, antispyware
|
|
Windows Firewall
|
A personal firewall that protects a computer from invasion and is automatically configured when you set your network location.
|
a personal firewall that protects computer from invasion , automatically configured, in the Network and sharing center
|
|
Worm
|
An infestation design to copy itself repeatedly to memory, on drive space, or on a network, until little memory, disk space or network bandwidth remains
|
infestation that copy itself repeatedly on memory , Drive space or on a network till none remains
|