• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/19

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

19 Cards in this Set

  • Front
  • Back
social engineering
using one's social skills to get computer users to provide you with information to access an information system or its data
dumpster diving
going through the trash cans of an organization to find secret or confidential information, including information needed to access an information system and/or its data
cyberterrorist
someone who intimidates or coerces a government or organization to advance his political or social objectives by launching computer based attacks against computers
hackers
a person who enjoys computer technology and spends time learning and using computer systems
criminal hacker (cracker)
a computer-savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords, corrupt files and programs, or even transfer money
script bunny
a cracker with little technical savvy who downloads programs called scripts, which automate the job of breaking into computers
insider
an employee, disgruntled or otherwise, working solo or in concert with outsiders to compromise corporate systems
virus
a computer program file capable of attaching to disks or other files and replicating itself repeatedly, typically without the users knowledge or permission
worm
a parasitic computer program that can create copies of itself on the infected computer or send copies to other computers via a network
trojan horse
a malicious program that disguises itself as a useful application and purposefully does something the user does not expect
anti virus program
software that runs in the background to protect your computer from dangers lurking on the internet and other possible sources of infected files
password sniffer
a small program hidden in a network or a computer system that records identification numbers and passwords
software piracy
the act of illegally duplicating software
public - key infrastructure
a means to enable users of an unsecured public network such as the internet to securely and privately exchange data through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority
biometrics
the measurement of one of a person's traits, whether physical or behavioral
intrusion detection system
software that monitors system and network resources and notifies network security personnel when it senses a possible intrusion
platform for privacy preferences
a screening technology that shields users from web sites that dont provide the level of privacy protection they desire
ergonomics
the science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them
code of ethics
a code that states the principles and core values that are essential to a set of people and, therefor, govern their behavior