• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/69

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

69 Cards in this Set

  • Front
  • Back
computer security risk
any event or acton that could cause a loss of or damage to computer hardware, software, data, information, processing capability
computer crime
any illegal act involving a computer
cybercrime
online or Internet-based illegal acts
hacker
someone who accesses a computer or network illegally
cracker
someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action
script kiddie
same intent as cracker; doesn’t have the technical skills and knowledge
corporate spies
hired to break into a specific computer and steal its proprietary data and information
cyberextortionist
someone who uses e-mail as a vehicle for extortion
malware
short for malicious software; programs that act without a user’s knowledge and deliberately alter the computer’s operations
virus
affects, or infects, a computer negatively by altering the way the
computer works without the user’s knowledge or permission
worm
program that copies itself repeatedly using up resources an dpossibly shutting down the computer or network
Trojan horse
program that hides within or looks like a legitimate program
rootkit
program that hides in a computer and allows someone from a remote
payload
the destructive event or prank the program is intended to deliver
trusted source
an organization or person you believe will not send a virus infected file knowingly
botnet
a group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes
zombie
a compromised computer whose owner is unaware the computer is being controlled remotely by an outsider
DoS attack
denial of service attack; an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail
back door
a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network
spoofing
a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
unauthorzied use
the use of a computer or its data for unapproved or possibly illegal activities
unauthorized access
the use of a computer or network without permission
CAPTCHA
Completely Automated Public Turing test to tell Computers and Humans Apart; a program that verifies user input is not computer generated
possessed object
any item that you must carry to gain access to a computer or computer facility
biometric device
authenticates a person’s identity by translating a personal characteristic into a digital code stored in the computer verifying a physical or behavioral characteristic
digital forensics
computer, network, or cyberforensics; the discovery, collection, and analysis of evidence found on computers and networks
hardware theft
the act of stealing computer equipment
hardware vandalism
the act of defacing or destroying computer equipment
software theft
when someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers and/or activates a program
license agreement
the right to use the software
information theft
when someone steals personal or confidential information
encryption
the process of converting readable data into unreadable characters to prevent unauthorized access
decrypt
decipher
encryption algorithm
set of steps that can convert readable plaintext into unreadable ciphertext
encryption key
a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext
plaintext
an original readable text, as opposed to a coded version
ciphertext
encrypted text
digital signature
an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender
digital certificate
a notice that guarantees a user or a Web site is legitimate
certificate authority
an authorized person or a company that issues and verifies digital certificates
system failure
the prolonged malfunction of a computer
surge protector
uses special electrical components to provide a stable current flow to the computer and other electronic equipment
UPS
uninterruptible power supply; contains surge protection circuits and one or more batteries that can provide power during a loss of power
backup
a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
restore
copying the backed up files to their original location on the computer
WAP
wireless access point
war driving
individuals attempt to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network
WPA
Wi-Fi protected access; a security standard that improves on older security standards by authenticating network users an dproviding more advanced encryption techniques
802.11i or WPA2
most recent network security standard; conforms to the government’s security standards and uses more sophisticated encryption techniques than WPA
RSI
repetitive strain injury; an injury or disorder of the muscles, nerves, tendons, ligaments, and joints
CVS
computer vision syndrome
ergonomics
an applied science devoted to incorporation comfort, efficiency, and safety into the design of items in the workplace
computer addiction
occurs when the computer consumes someone’s entire social life
computer ethics
the moral guidelines that govern the use of computers and information systems
National Press Photographers
believes that allowing even the slightest alteration could lead to misrepresentative photos
Intellectual Property Rights
the rights to which creators are entitled for their work
copyright
gives authors and artists exclusive rights to duplicate, publish, and sell their materials
green computing
involves reducing the electricity and environmental wste while using a computer
energy star program
helps reduce the amount of electricity used by computers and related devices
information privacy
refers to the right of individuals and companies to deny or restrict the collection and use of information about them
electronic profile
personal data that is submitted into an online database
cookie
a small text file that a Web server stores on your computer
spyware
a program placed on a computer without the user’s knowledge that secretly collects information about the user
adware
a program that displays an online advertisement in a banner or pop-up window
spam
an unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once
phishing
a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information
pharming
a scam where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing
social engineering
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others
employee monitoring
involves the use of computers to observe, record, and review an employee’s use of a computer