• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/2

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

2 Cards in this Set

  • Front
  • Back
Computer security risk
Computer crime
Cybercrime
Hacker
Cracker
Script
kiddie
Corporate
spies
extortionist
Cyber
Malware
types
Four
malware
of
Payload
Five ways a user can cause malware to infect their computer:
Trusted
source
Botnet
Zombie
attack
Dos
door
Back
Spoofing
Two ways to safeguard against botnets, dos attacks, and spoofing:
Unauthorized
use
Unauthorized
access
Two ways to safeguard against unauthorized use and access:
Captcha
Possessed
object
Biometric
device
Digital
forensics
any event or action that could cause a loss of or damage to computer hardware, software, and data.
an illegal act involving a computer generally is referred to as computer crime.
online or internet based illegal acts.
someone who accesses a computer or network illegally
someone who accesses a computer or network illegally but had the intent of destroying data, stealing information, or other malicious activity.
some intent as a cracker but does not have the technical skills and knowledge
people who are hired to seal information or data.
someone who uses email as a vehicle for extortion.
programs that act without a users knowledge and deliberately alter the computers operations.
viruses
1. worms
2. Trojan horse
3. root kit
the destruction event or prank the program is intended to deliver.
300,000 sites can infect your computer.
1. opens a file
2. runes a infected program
3. boots the computer with infected removable media inserted
4. connects an unprotected computer to a network
5. When a certain condition or event occurs such as the computers clock changing to a specific date.
an organization or person you believe will not send a virus infected file knowingly.
a group of compromised computers connected to a network such as the internet that are used as part of a network that attacks other networks usually for nefarious porpoises.
a compromised computer whose owner is unaware of the computer is being controlled by an outsider.
denial of service attack- an assault that’s purpose is to disrupt computer access to an internet service such as the web.
a program or set of instructions in a program that allow users to bypass security controls when accessing a program or network.
a technique intruders use to make their network appear legitimate to a victims computer.
1. implement firewall solutions
2. install intrusion detection software
use of a computer or its data for unapproved or possibly illegal activates.
use of a computer or network without permission.
1. written policy
2. firewalls
completely automated public turning test to tell computers and humans apart.
object-an item that you must carry to gain access to a computer or computer facility.
authenticates a person’s identity by translation a personal characteristic such as fingerprints into a digital code that is compared with a digital code stored in the computer verifying a physical characteristic.
the discovery, collection, and analysis of evidence found on computers and networks.
Hardware theft
vandalism
Hardware
Software
theft
agreement
License
Information
theft
Encryption
Decrypt
Encryption
algorithm
Encryption
key
Plain
text
Cipher
text
signature
Digital
Digital
certificate
Certificate
authority
failure
System
Surge
protector
Ups
Backup
Restore
80% of wireless networks have no security protection
Wap
War
driving
Wpa
802.11i or wpa 2-
Encrypted
message
the act of stealing computer equipment
the act of defacing or destroying computer equipment.
when someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers and activates a program.
the right to use the software.
occurs when someone steals personal or confidential information.
to decipher encrypted data
the process of converting readable data into unreadable characters to prevent unauthorized access.
a set of steps that can convert readable plaintext into unreadable cipher text.
a programmed formula that the originator of the data uses to encrypt the plain text and the recipient of the data uses to decrypt the cipher text.
the encrypted scrambled data
the uncrypted readable data
a encrypted code that a person or website attaches to an electronic message to verify the identity of the message sender.
a notice that guarantees a user of a web site is legitimate.
a authorized person or a company that issues and verifies digital certificates.
the prolonged malfunction of a computer.
uses a special electric components to provide a stable current flow to the computer.
uninterruptible power supply- a device that contains surge protection and one or more batteries that provides power during a loss of power.
a duplicate file or program that can be used if the original is lost or damaged.
copying files backup files to their original location on the computer.
wireless access point- place to get wifi
a individual attempts to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have wireless networks.
wifi protected access a security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques.
the most recent network security standard, which conforms to the governments security standards and uses more sophisticated encryption techniques than wpa.