Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
69 Cards in this Set
- Front
- Back
computer security risk
|
any event or acton that could cause a loss of or damage to computer hardware, software, data, information, processing capability
|
|
computer crime
|
any illegal act involving a computer
|
|
cybercrime
|
online or Internet-based illegal acts
|
|
hacker
|
someone who accesses a computer or network illegally
|
|
cracker
|
someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action
|
|
script kiddie
|
same intent as cracker; doesn’t have the technical skills and knowledge
|
|
corporate spies
|
hired to break into a specific computer and steal its proprietary data and information
|
|
cyberextortionist
|
someone who uses e-mail as a vehicle for extortion
|
|
malware
|
short for malicious software; programs that act without a user’s knowledge and deliberately alter the computer’s operations
|
|
virus
|
affects, or infects, a computer negatively by altering the way the
computer works without the user’s knowledge or permission |
|
worm
|
program that copies itself repeatedly using up resources an dpossibly shutting down the computer or network
|
|
Trojan horse
|
program that hides within or looks like a legitimate program
|
|
rootkit
|
program that hides in a computer and allows someone from a remote
|
|
payload
|
the destructive event or prank the program is intended to deliver
|
|
trusted source
|
an organization or person you believe will not send a virus infected file knowingly
|
|
botnet
|
a group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes
|
|
zombie
|
a compromised computer whose owner is unaware the computer is being controlled remotely by an outsider
|
|
DoS attack
|
denial of service attack; an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail
|
|
back door
|
a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network
|
|
spoofing
|
a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
|
|
unauthorzied use
|
the use of a computer or its data for unapproved or possibly illegal activities
|
|
unauthorized access
|
the use of a computer or network without permission
|
|
CAPTCHA
|
Completely Automated Public Turing test to tell Computers and Humans Apart; a program that verifies user input is not computer generated
|
|
possessed object
|
any item that you must carry to gain access to a computer or computer facility
|
|
biometric device
|
authenticates a person’s identity by translating a personal characteristic into a digital code stored in the computer verifying a physical or behavioral characteristic
|
|
digital forensics
|
computer, network, or cyberforensics; the discovery, collection, and analysis of evidence found on computers and networks
|
|
hardware theft
|
the act of stealing computer equipment
|
|
hardware vandalism
|
the act of defacing or destroying computer equipment
|
|
software theft
|
when someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers and/or activates a program
|
|
license agreement
|
the right to use the software
|
|
information theft
|
when someone steals personal or confidential information
|
|
encryption
|
the process of converting readable data into unreadable characters to prevent unauthorized access
|
|
decrypt
|
decipher
|
|
encryption algorithm
|
set of steps that can convert readable plaintext into unreadable ciphertext
|
|
encryption key
|
a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext
|
|
plaintext
|
an original readable text, as opposed to a coded version
|
|
ciphertext
|
encrypted text
|
|
digital signature
|
an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender
|
|
digital certificate
|
a notice that guarantees a user or a Web site is legitimate
|
|
certificate authority
|
an authorized person or a company that issues and verifies digital certificates
|
|
system failure
|
the prolonged malfunction of a computer
|
|
surge protector
|
uses special electrical components to provide a stable current flow to the computer and other electronic equipment
|
|
UPS
|
uninterruptible power supply; contains surge protection circuits and one or more batteries that can provide power during a loss of power
|
|
backup
|
a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
|
|
restore
|
copying the backed up files to their original location on the computer
|
|
WAP
|
wireless access point
|
|
war driving
|
individuals attempt to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network
|
|
WPA
|
Wi-Fi protected access; a security standard that improves on older security standards by authenticating network users an dproviding more advanced encryption techniques
|
|
802.11i or WPA2
|
most recent network security standard; conforms to the government’s security standards and uses more sophisticated encryption techniques than WPA
|
|
RSI
|
repetitive strain injury; an injury or disorder of the muscles, nerves, tendons, ligaments, and joints
|
|
CVS
|
computer vision syndrome
|
|
ergonomics
|
an applied science devoted to incorporation comfort, efficiency, and safety into the design of items in the workplace
|
|
computer addiction
|
occurs when the computer consumes someone’s entire social life
|
|
computer ethics
|
the moral guidelines that govern the use of computers and information systems
|
|
National Press Photographers
|
believes that allowing even the slightest alteration could lead to misrepresentative photos
|
|
Intellectual Property Rights
|
the rights to which creators are entitled for their work
|
|
copyright
|
gives authors and artists exclusive rights to duplicate, publish, and sell their materials
|
|
green computing
|
involves reducing the electricity and environmental wste while using a computer
|
|
energy star program
|
helps reduce the amount of electricity used by computers and related devices
|
|
information privacy
|
refers to the right of individuals and companies to deny or restrict the collection and use of information about them
|
|
electronic profile
|
personal data that is submitted into an online database
|
|
cookie
|
a small text file that a Web server stores on your computer
|
|
spyware
|
a program placed on a computer without the user’s knowledge that secretly collects information about the user
|
|
adware
|
a program that displays an online advertisement in a banner or pop-up window
|
|
spam
|
an unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once
|
|
phishing
|
a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information
|
|
pharming
|
a scam where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing
|
|
social engineering
|
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others
|
|
employee monitoring
|
involves the use of computers to observe, record, and review an employee’s use of a computer
|