• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/85

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

85 Cards in this Set

  • Front
  • Back
Computer Security risk
action or event that causes loss or damage of computers
Computer Crime
illegal act involving computer
cyber crime
illegal act over internet
Hacker
someone who accsses a computer or network illegally
Cracker
hacker with intent of stealing or damaging
Script Kidde
cracker without technical skills
Corporate spies
Hired cracker to steal other companies info
cyberextorsionist
uses internet to commit extorsion
Malware
malicious software the negatively affects computer
Virus
spreads and alters computer
Worms
Copies self and uses resources
Trojan horse
malicious program that looks legit
Payload
destructive event of malware
ways to infect computer
1. open infected files
2. run infected programs
3.Boot computer with infected removeable storage device
4.Connect unprotected computer to network
5. certain event or condition occurs
trusted source
someone you know who wont send you malware
Botnet
group of computers in a network
Zombie
computer thats controled but its unknown
DoS attack
attack to disrupt internet service
Backdoor
hole in program that allows users to bypass security
spoofing
sending a legitimate looking message to scam people
2 ways to protect yourself
firewall
Intrusion detection software
Unauthorized use
use of computer or network without permission
2 ways to safeguard against unauthorized use and access
AUP
Firewall+IDS
CAPTCHA
Automated Public Turning Test to tell users and computers apart
Possesed object
object you must carry to gain access to a computer

Dan Ritter
Biometric device
identifys someone through characteristics
Digital Forensics
evidence found on networks and computers
hardware theft
act of stealing hardware
hardware vandalism
vandalizing computers and related things
RTLS
realtime location system -identifiably where a objects is
Biometric device
identifys someone through characteristics
Digital Forensics
evidence found on networks and computers
hardware theft
act of stealing hardware
hardware vandalism
vandalizing computers and related things
RTLS
realtime location system -identifiably where a objects is
software theft
stealing software in any way
piracy
unauthorized use and duplication of copyrighted material
license agreement
outlines what the user can and cant do
Info theft
stealing personal or confidential info
product authorization
entering a key to authorize software
encryption
converting readable characters to unreadable
encryption algorithm
steps to convert plaintext into cipher text
encryption key
programed formula that user to encrypt data
digital signature
encrypted code that identifies a person or company
secure site
website that uses encryption techniques to secure data
digital certificate
verifies a websites legit
cirtificate authoruty
verifies digital certificates
system falure
prolonged malfunction of computer
digital signature
encrypted code that identifies a person or company
secure site
website that uses encryption techniques to secure data

Dan Ritter
digital certificate
verifies a websites legit
cirtificate authoruty
verifies digital certificates
system falure
prolonged malfunction of computer
surge protector
uses special mechanical components to prevent power surges
uninterpretableback power supply
provides a asurge protector and batteries for when power goes out
backup
duplicate file
back up
make a copy
restote
bring those copies back when lost
wi-fi protected access
secutiry standard
802.11i
new security standard that thats up to date
RSI
repetitive strain injury
CVS
computer vision syndrome-eye strain
Ergonmomics
applied science for comfort computing
Computer addiction
computer controls entire social life
computer ethics
moral guidelines of computer use
intellectual property rights
rights of creators to what they make
copyright
exculusive rights to makers
green computing
reducing electricity when using computers
energy star program
program to reduce amount of eletricity used by computers
info privacy
right of people\companies to restrict use of their info
electronic profile
profile of your preferences
cookie
small textfile on your computer about you
spyware
program that secretly steal info from user
adware
displays online ads
spam
un-solicited email message
electronic profile
profile of your preferences

Dan Ritter
cookie
small textfile on your computer about you
spyware
program that secretly steal info from user
adware
displays online ads
spam
un-solicited email message
phishing
trying to obtain personal info through email scams
pharming
scamming via spoofing
social engerning
stealing info via trusting human nature
employee monitoring
monitoring use of companies computers
content filtering
restricting access to certain content

Dan Ritter