Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
50 Cards in this Set
- Front
- Back
adware |
software that displays advertisements and is integrated into another program offered at no charge or at low cost. |
|
back door |
method of bypassing normal authentication, securing unauthorized remote access to a computer, obtaining access to plaintext |
|
back up |
copy of one or more files created as an alternate in case the original data is lost or becomes unusable |
|
backup |
to copy files to a second medium (a disk or tape) as a precaution in case the first medium fails. |
|
biometric device |
device that identifies persons seeking access to a computing system by determining their physical characteristics through fingerprints, voice recognition, retina patterns, pictures, weight, or other means. |
|
botnet |
group of computers that are controlled from a single source and run related software programs and scripts |
|
code of conduct |
written guideline that helps determine whether a specifications ethical/unethical or allowed/not allowed. |
|
computer crime |
unauthorized use of a computer for personal gain, as in the illegal transfer of funds or to alter the data or property of others. |
|
computer ethics |
computer ethics is set of moral principles that regulate the use of computers |
|
content filtering |
the use of a program to screen and exclude from access or availability Web pages or e-mail that is deemed objectionable |
|
cookie |
small amount of data generated by a website and saved by your web browser |
|
cracker |
someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security |
|
cybercrime |
criminal activity done using computers and the Internet |
|
cyberextortionist |
crime involving an attack or threat of attack against an enterprise, coupled with a demand for money to avert or stop the attack. |
|
cyberterrorist |
programmer who breaks into computer systems in order to steal or change or destroy information as a form of cyber-terrorism |
|
decrypt |
To decipher |
|
DoS attack |
an attempt to make a machine or network resource unavailable to its intended users. |
|
digital certificate |
electronic "passport" that allows a person, computer or organization to exchange information securely over the Internet using the public key infrastructure |
|
digital forensics |
the process of uncovering and interpreting electronic data for use in a court of law |
|
digital security risk |
is any event or action that could cause a loss of damage to computer hardware |
|
digital signature |
mathematical technique used to validate the authenticity and integrity of a message, software, or digital document. |
|
disaster recovery plan |
describes how an organization is to deal with potential disasters |
|
employee monitoring |
use of various methods of workplace surveillance to gather information about the activities and locations of staff members |
|
encryption |
conversion of electronic data into another form, called ciphertext, which cannot be easily understood by anyone except authorized parties |
|
fingerprint reader |
a way of security using your finger |
|
firewall |
set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks |
|
green computing |
use of computers and related resources in an environmentally responsible manner |
|
hacker |
somebody accessing another's computer without authorization |
|
information privacy |
the aspect of information technology (IT) that deals with the ability an organization or individual has to determine what data in a computer system can be shared with third parties. |
|
information theft |
when personal information is stolen |
|
license agreement |
Licensors use license agreements to grant their licensees the right to use certain intellectual property, including software, trademarks, service marks, inventions, and patents |
|
malware |
harmful software |
|
online security service |
government agency in the United Kingdom that is responsible for internal security and counterintelligence on British territory |
|
password |
word securing access: a secret word or phrase that somebody must use to gain entry to a place |
|
personal firewall |
software application used to protect a single Internet-connected computer from intruders |
|
phishing |
attempt to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication |
|
PIN |
the devices that press on the ink ribbon to make dots on the paper |
|
piracy |
Copyright or patent infringement |
|
product activation |
procedure by which a piece of software or operating system is proven to be legitimately installed |
|
restore |
return something to previous condition |
|
script kiddie |
an unskilled individual who uses scripts or programs developed by others to attack computer systems and networks, and deface websites |
|
secure site |
website where it is safe to go on where people can not steal personal info |
|
social engineering |
practical application of social science |
|
software piracy |
Making or distributing unauthorised copies of software, either for kudos or for profit |
|
software theft |
Unauthorised duplication and/or use of computer software |
|
spoofing |
to hoax, trick, or deceive |
|
spyware |
software that reveals identity of user |
|
user name |
initial identifier used to access computer |
|
web filtering software |
program that can screen an incoming Web page to determine whether some or all of it should not be displayed to the user. |
|
zombie |
A computer that has been implanted with a daemon that puts it under the control of a malicious hacker without the knowledge of the computer owner |