• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/50

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

50 Cards in this Set

  • Front
  • Back

adware

software that displays advertisements and is integrated into another program offered at no charge or at low cost.

back door

method of bypassing normal authentication, securing unauthorized remote access to a computer, obtaining access to plaintext

back up

copy of one or more files created as an alternate in case the original data is lost or becomes unusable

backup

to copy files to a second medium (a disk or tape) as a precaution in case the first medium fails.

biometric device

device that identifies persons seeking access to a computing system by determining their physical characteristics through fingerprints, voice recognition, retina patterns, pictures, weight, or other means.

botnet

group of computers that are controlled from a single source and run related software programs and scripts

code of conduct

written guideline that helps determine whether a specifications ethical/unethical or allowed/not allowed.

computer crime

unauthorized use of a computer for personal gain, as in the illegal transfer of funds or to alter the data or property of others.

computer ethics

computer ethics is set of moral principles that regulate the use of computers

content filtering

the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable

cookie

small amount of data generated by a website and saved by your web browser

cracker

someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security

cybercrime

criminal activity done using computers and the Internet

cyberextortionist

crime involving an attack or threat of attack against an enterprise, coupled with a demand for money to avert or stop the attack.

cyberterrorist

programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism

decrypt

To decipher

DoS attack

an attempt to make a machine or network resource unavailable to its intended users.

digital certificate

electronic "passport" that allows a person, computer or organization to exchange information securely over the Internet using the public key infrastructure

digital forensics

the process of uncovering and interpreting electronic data for use in a court of law

digital security risk

is any event or action that could cause a loss of damage to computer hardware

digital signature

mathematical technique used to validate the authenticity and integrity of a message, software, or digital document.

disaster recovery plan

describes how an organization is to deal with potential disasters

employee monitoring

use of various methods of workplace surveillance to gather information about the activities and locations of staff members

encryption

conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties

fingerprint reader

a way of security using your finger

firewall

set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks

green computing

use of computers and related resources in an environmentally responsible manner

hacker

somebody accessing another's computer without authorization

information privacy

the aspect of information technology (IT) that deals with the ability an organization or individual has to determine what data in a computer system can be shared with third parties.

information theft

when personal information is stolen

license agreement

Licensors use license agreements to grant their licensees the right to use certain intellectual property, including software, trademarks, service marks, inventions, and patents

malware

harmful software

online security service

government agency in the United Kingdom that is responsible for internal security and counterintelligence on British territory

password

word securing access: a secret word or phrase that somebody must use to gain entry to a place

personal firewall

software application used to protect a single Internet-connected computer from intruders

phishing

attempt to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication

PIN

the devices that press on the ink ribbon to make dots on the paper

piracy

Copyright or patent infringement

product activation

procedure by which a piece of software or operating system is proven to be legitimately installed

restore

return something to previous condition

script kiddie

an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks, and deface websites

secure site

website where it is safe to go on where people can not steal personal info

social engineering

practical application of social science

software piracy

Making or distributing unauthorised copies of software, either for kudos or for profit

software theft

Unauthorised duplication and/or use of computer software

spoofing

to hoax, trick, or deceive

spyware

software that reveals identity of user

user name

initial identifier used to access computer

web filtering software

program that can screen an incoming Web page to determine whether some or all of it should not be displayed to the user.

zombie

A computer that has been implanted with a daemon that puts it under the control of a malicious hacker without the knowledge of the computer owner