Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
85 Cards in this Set
- Front
- Back
Computer Security risk
|
action or event that causes loss or damage of computers
|
|
Computer Crime
|
illegal act involving computer
|
|
cyber crime
|
illegal act over internet
|
|
Hacker
|
someone who accsses a computer or network illegally
|
|
Cracker
|
hacker with intent of stealing or damaging
|
|
Script Kidde
|
cracker without technical skills
|
|
Corporate spies
|
Hired cracker to steal other companies info
|
|
cyberextorsionist
|
uses internet to commit extorsion
|
|
Malware
|
malicious software the negatively affects computer
|
|
Virus
|
spreads and alters computer
|
|
Worms
|
Copies self and uses resources
|
|
Trojan horse
|
malicious program that looks legit
|
|
Payload
|
destructive event of malware
|
|
ways to infect computer
|
1. open infected files
2. run infected programs 3.Boot computer with infected removeable storage device 4.Connect unprotected computer to network 5. certain event or condition occurs |
|
trusted source
|
someone you know who wont send you malware
|
|
Botnet
|
group of computers in a network
|
|
Zombie
|
computer thats controled but its unknown
|
|
DoS attack
|
attack to disrupt internet service
|
|
Backdoor
|
hole in program that allows users to bypass security
|
|
spoofing
|
sending a legitimate looking message to scam people
|
|
2 ways to protect yourself
|
firewall
Intrusion detection software |
|
Unauthorized use
|
use of computer or network without permission
|
|
2 ways to safeguard against unauthorized use and access
|
AUP
Firewall+IDS |
|
CAPTCHA
|
Automated Public Turning Test to tell users and computers apart
|
|
Possesed object
|
object you must carry to gain access to a computer
Dan Ritter |
|
Biometric device
|
identifys someone through characteristics
|
|
Digital Forensics
|
evidence found on networks and computers
|
|
hardware theft
|
act of stealing hardware
|
|
hardware vandalism
|
vandalizing computers and related things
|
|
RTLS
|
realtime location system -identifiably where a objects is
|
|
Biometric device
|
identifys someone through characteristics
|
|
Digital Forensics
|
evidence found on networks and computers
|
|
hardware theft
|
act of stealing hardware
|
|
hardware vandalism
|
vandalizing computers and related things
|
|
RTLS
|
realtime location system -identifiably where a objects is
|
|
software theft
|
stealing software in any way
|
|
piracy
|
unauthorized use and duplication of copyrighted material
|
|
license agreement
|
outlines what the user can and cant do
|
|
Info theft
|
stealing personal or confidential info
|
|
product authorization
|
entering a key to authorize software
|
|
encryption
|
converting readable characters to unreadable
|
|
encryption algorithm
|
steps to convert plaintext into cipher text
|
|
encryption key
|
programed formula that user to encrypt data
|
|
digital signature
|
encrypted code that identifies a person or company
|
|
secure site
|
website that uses encryption techniques to secure data
|
|
digital certificate
|
verifies a websites legit
|
|
cirtificate authoruty
|
verifies digital certificates
|
|
system falure
|
prolonged malfunction of computer
|
|
digital signature
|
encrypted code that identifies a person or company
|
|
secure site
|
website that uses encryption techniques to secure data
Dan Ritter |
|
digital certificate
|
verifies a websites legit
|
|
cirtificate authoruty
|
verifies digital certificates
|
|
system falure
|
prolonged malfunction of computer
|
|
surge protector
|
uses special mechanical components to prevent power surges
|
|
uninterpretableback power supply
|
provides a asurge protector and batteries for when power goes out
|
|
backup
|
duplicate file
|
|
back up
|
make a copy
|
|
restote
|
bring those copies back when lost
|
|
wi-fi protected access
|
secutiry standard
|
|
802.11i
|
new security standard that thats up to date
|
|
RSI
|
repetitive strain injury
|
|
CVS
|
computer vision syndrome-eye strain
|
|
Ergonmomics
|
applied science for comfort computing
|
|
Computer addiction
|
computer controls entire social life
|
|
computer ethics
|
moral guidelines of computer use
|
|
intellectual property rights
|
rights of creators to what they make
|
|
copyright
|
exculusive rights to makers
|
|
green computing
|
reducing electricity when using computers
|
|
energy star program
|
program to reduce amount of eletricity used by computers
|
|
info privacy
|
right of people\companies to restrict use of their info
|
|
electronic profile
|
profile of your preferences
|
|
cookie
|
small textfile on your computer about you
|
|
spyware
|
program that secretly steal info from user
|
|
adware
|
displays online ads
|
|
spam
|
un-solicited email message
|
|
electronic profile
|
profile of your preferences
Dan Ritter |
|
cookie
|
small textfile on your computer about you
|
|
spyware
|
program that secretly steal info from user
|
|
adware
|
displays online ads
|
|
spam
|
un-solicited email message
|
|
phishing
|
trying to obtain personal info through email scams
|
|
pharming
|
scamming via spoofing
|
|
social engerning
|
stealing info via trusting human nature
|
|
employee monitoring
|
monitoring use of companies computers
|
|
content filtering
|
restricting access to certain content
Dan Ritter |