• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/30

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

30 Cards in this Set

  • Front
  • Back
computer security risk
any event or action that is meant to damage or destory your files or information
computer crime
a security risk that is intended for a computer
cyber crime
online or internet based illegal acts
hacker
accesses a computer or network illegally
cracker
a very skilled computer hacker with the duragotory intent to damage your informayion
script kiddie
a cracker with almost no computer intelligence but uses preset software
cyber extortionist
uses the internet or computers to extort something
cyber terrorist
damages computers for political reasons.
virus
malware that damages files, and infects your computer
root kit
allow your computer to be controlled from a stanger in a remote location
worm
malware that copies itself and clogs up all the memory
trojan horse
malware that looks like a legit file but is a virus
malware
malicious software that is intended to destroy your information
payload
the intented destruction of malware
trusted source
an organization or person that wont send you viruses
DoS attack
denial of service attack
botnet
a group of ppl that attack a network together
zombie
a root kit controlled computer that doesn't know its controlled
anti virus program
a software program that scans for virus signatures and fixes the problem
quarantine
isolation of a virus so it cant spread
virus definition
the definition of a virus
firewall
a security device that keeps unauthorized ppl out of your network
spoofing
appears legit but is a scam
backdoor
made by the original creator, allows a bypass of security
unautorized acess
access to a computer network with out permission
unauthorized use
using of softwar or computers with out permission
password
a code of characters that belongs only to you and acts as an access code
CAPTCHA
a series of characters computers can read or bypass but humans can
biometric device
a device that pulls up info on you through your personal identiy and makeup
Digital forensics
the discovery, collection, and evidence of computer information