• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/57

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

57 Cards in this Set

  • Front
  • Back
hardware theft
act of stealing computer equipment
hardware vandalism
defacing or destroying computer equipment
software theft
someone steals software media, intentionally erases programs, illegally copies, illegealy activates program
license agreement
right to use software
information theft
someone steals personal or confidential information
encryption
process of converting readable data into unreadable characters
decrypt
decipher into readable form
encryption algorithim
set of steps can convert readable plaintext into ciphertext
encryption key
programmed formula that originator of data uses to encrypt the plaintext
plaintext
readable data
ciphertext
encrypted data
digital signature
encrypted code that a person, web site, organization attaches to electronic message
digital certificate
notice that guarentees a user or a web site is legit
certificate authority
authorizes person or a company that issues and verifies digital certificates
system failure
prolonged malfunction
surge protector
uses special electrical components to provide a stable current flow to computer and other equipment
UPS
Uninteruptive power supply-device that contains sure prtection curcuits and one or more batteries that provide power
backup
duplicate of a file, program, or disk that can be used if original file is lost
restore
files copying the backed up files to their original location on computer
WAP
unsecured wirless acess point
war driving
individuals atempt to detect wireless networks via mobile devices
WPA
wifi protected acces
WPA2
most recent network security standard, conforms with gov regs
RSI
rpetetive strain injury-disorder of muscles,nerves,tendons,ligaments
CVS
computer vision syndrome-health related condition due to computer use
ergonomics
applied science for comfort
computer adiction
computer consumes entire social life
computer ethics
moral guidlines while using computer
national press photgraphers
group who opposes any manipulation to any image
intellectual property rights
rights which creators are entiled to their work
copyright
gives authors and artists to publish, duplicarte and sell materials
green computing
reducing electronical and enviormetal waste while using computer
energy star program
reduce amount of electricity used by computers and devices
info privacy
rights of individuals and companies to deny or restrict collection and use of information about them
electronic profile
personal info on website
cookies
small text file stored on computer
computer security risk
event or action that cause damage to computer,software,hardware
hacker
acceses computer or network illegally
cracker
accesses A computer or network illegally, but does no harm
script kiddie
same intent as cracker, not have technolgical skills and knowledge
cyberexoterrorist
uses email for extortion
corporate spies
hired to break into computers and steal info/data
malware
programs act without users knowledge
payload
destructive evnt or prank program is intended to deliver
trusted source
someone you believe will not send you infected file
zombie
compromised computer and owner is unaware
DOS attack
assault whose prupose is to disrupt internet use
botnet
group of compromised computers
back door
program or instructions in program allows users to bypass security
spoofing
intruders make networks or internet transmision appear legit to computer or network
unauthorized acces
use of comp or network without permission
unauthorized use
use of computer or data for unaporved or illegal activites
spyware
program placed on users computer without users knowledge that collects info
adware
program that displays online advertisment
spam
unsolicited email message or newsgroup sent to multiple people
phishing
scam where perpetrator sends offical looking email in attempt to gain personal info
social engineering
gaining acceses or info by taking advatage of human nature