Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
30 Cards in this Set
- Front
- Back
computer security risk
|
any event or action that is meant to damage or destory your files or information
|
|
computer crime
|
a security risk that is intended for a computer
|
|
cyber crime
|
online or internet based illegal acts
|
|
hacker
|
accesses a computer or network illegally
|
|
cracker
|
a very skilled computer hacker with the duragotory intent to damage your informayion
|
|
script kiddie
|
a cracker with almost no computer intelligence but uses preset software
|
|
cyber extortionist
|
uses the internet or computers to extort something
|
|
cyber terrorist
|
damages computers for political reasons.
|
|
virus
|
malware that damages files, and infects your computer
|
|
root kit
|
allow your computer to be controlled from a stanger in a remote location
|
|
worm
|
malware that copies itself and clogs up all the memory
|
|
trojan horse
|
malware that looks like a legit file but is a virus
|
|
malware
|
malicious software that is intended to destroy your information
|
|
payload
|
the intented destruction of malware
|
|
trusted source
|
an organization or person that wont send you viruses
|
|
DoS attack
|
denial of service attack
|
|
botnet
|
a group of ppl that attack a network together
|
|
zombie
|
a root kit controlled computer that doesn't know its controlled
|
|
anti virus program
|
a software program that scans for virus signatures and fixes the problem
|
|
quarantine
|
isolation of a virus so it cant spread
|
|
virus definition
|
the definition of a virus
|
|
firewall
|
a security device that keeps unauthorized ppl out of your network
|
|
spoofing
|
appears legit but is a scam
|
|
backdoor
|
made by the original creator, allows a bypass of security
|
|
unautorized acess
|
access to a computer network with out permission
|
|
unauthorized use
|
using of softwar or computers with out permission
|
|
password
|
a code of characters that belongs only to you and acts as an access code
|
|
CAPTCHA
|
a series of characters computers can read or bypass but humans can
|
|
biometric device
|
a device that pulls up info on you through your personal identiy and makeup
|
|
Digital forensics
|
the discovery, collection, and evidence of computer information
|