Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
22 Cards in this Set
- Front
- Back
computer security risk
|
is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
|
|
computer crime
|
any illegal act involving a computer generally.
|
|
cybercrime
|
refers to online or Internet-based illegal acts.
|
|
hacker
|
refers to someone who accesses a computer or network illegally.
|
|
cracker
|
someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action.
|
|
script kiddie
|
has the same intent as a cracker but does not have the technical skills and knowledge.
|
|
corporate spies
|
people that have excellent computer and networking skills and are hired to break into a specific computer and steal its propietary data and information.
|
|
cyberextortionist
|
is someone who uses e-mail as a vehiclefor extortion.
|
|
malware
|
(malicious software) programs that act without a users knowledge and deliberately alter the computers operations.
|
|
payload
|
is the destructive event or prank the program is intended to deliver.
|
|
trusted source
|
is an organization or person you believe will not send a virus infected file knowingly.
|
|
botnet
|
is a group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for netorious purposes.
|
|
zombie
|
one whose owner is unaware the computer is being controlled remotely by an outsider.
|
|
DoS attack
|
(denial of service attack) is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail.
|
|
back door
|
is a program or set of instructions in a program that allows users to bypass security controls when accessing.
|
|
spoofing
|
is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
|
|
unauthorized use
|
is the use of a computer or its data for unapproval or possibly illegal activities.
|
|
unauthorized access
|
is the use of a computer or network without permission.
|
|
CAPTCHA
|
( completely automated public turn in test to tell computers and humans apart) a program that verifies user imput is not computer generated.
|
|
possessed object
|
is any item that you must carry to gain access to a computer or computer facility.
|
|
biometric device
|
authenticates a person's identity by translating a personal characteristic, such as a fingerprint, into a digital code.
|
|
digital forensics
|
is the discovery, collection, and analysis of evidence found on computers and networks.
|