Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
57 Cards in this Set
- Front
- Back
hardware theft
|
act of stealing computer equipment
|
|
hardware vandalism
|
defacing or destroying computer equipment
|
|
software theft
|
someone steals software media, intentionally erases programs, illegally copies, illegealy activates program
|
|
license agreement
|
right to use software
|
|
information theft
|
someone steals personal or confidential information
|
|
encryption
|
process of converting readable data into unreadable characters
|
|
decrypt
|
decipher into readable form
|
|
encryption algorithim
|
set of steps can convert readable plaintext into ciphertext
|
|
encryption key
|
programmed formula that originator of data uses to encrypt the plaintext
|
|
plaintext
|
readable data
|
|
ciphertext
|
encrypted data
|
|
digital signature
|
encrypted code that a person, web site, organization attaches to electronic message
|
|
digital certificate
|
notice that guarentees a user or a web site is legit
|
|
certificate authority
|
authorizes person or a company that issues and verifies digital certificates
|
|
system failure
|
prolonged malfunction
|
|
surge protector
|
uses special electrical components to provide a stable current flow to computer and other equipment
|
|
UPS
|
Uninteruptive power supply-device that contains sure prtection curcuits and one or more batteries that provide power
|
|
backup
|
duplicate of a file, program, or disk that can be used if original file is lost
|
|
restore
|
files copying the backed up files to their original location on computer
|
|
WAP
|
unsecured wirless acess point
|
|
war driving
|
individuals atempt to detect wireless networks via mobile devices
|
|
WPA
|
wifi protected acces
|
|
WPA2
|
most recent network security standard, conforms with gov regs
|
|
RSI
|
rpetetive strain injury-disorder of muscles,nerves,tendons,ligaments
|
|
CVS
|
computer vision syndrome-health related condition due to computer use
|
|
ergonomics
|
applied science for comfort
|
|
computer adiction
|
computer consumes entire social life
|
|
computer ethics
|
moral guidlines while using computer
|
|
national press photgraphers
|
group who opposes any manipulation to any image
|
|
intellectual property rights
|
rights which creators are entiled to their work
|
|
copyright
|
gives authors and artists to publish, duplicarte and sell materials
|
|
green computing
|
reducing electronical and enviormetal waste while using computer
|
|
energy star program
|
reduce amount of electricity used by computers and devices
|
|
info privacy
|
rights of individuals and companies to deny or restrict collection and use of information about them
|
|
electronic profile
|
personal info on website
|
|
cookies
|
small text file stored on computer
|
|
computer security risk
|
event or action that cause damage to computer,software,hardware
|
|
hacker
|
acceses computer or network illegally
|
|
cracker
|
accesses A computer or network illegally, but does no harm
|
|
script kiddie
|
same intent as cracker, not have technolgical skills and knowledge
|
|
cyberexoterrorist
|
uses email for extortion
|
|
corporate spies
|
hired to break into computers and steal info/data
|
|
malware
|
programs act without users knowledge
|
|
payload
|
destructive evnt or prank program is intended to deliver
|
|
trusted source
|
someone you believe will not send you infected file
|
|
zombie
|
compromised computer and owner is unaware
|
|
DOS attack
|
assault whose prupose is to disrupt internet use
|
|
botnet
|
group of compromised computers
|
|
back door
|
program or instructions in program allows users to bypass security
|
|
spoofing
|
intruders make networks or internet transmision appear legit to computer or network
|
|
unauthorized acces
|
use of comp or network without permission
|
|
unauthorized use
|
use of computer or data for unaporved or illegal activites
|
|
spyware
|
program placed on users computer without users knowledge that collects info
|
|
adware
|
program that displays online advertisment
|
|
spam
|
unsolicited email message or newsgroup sent to multiple people
|
|
phishing
|
scam where perpetrator sends offical looking email in attempt to gain personal info
|
|
social engineering
|
gaining acceses or info by taking advatage of human nature
|