• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/65

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

65 Cards in this Set

  • Front
  • Back
Computer Security Risk
any event or action that could cause a lot damage to computer hardware, software, data, info., or processing cabablity
Computer Crime
any illegal act involving a computer
Cybercrime
online/ internet based illegal acts
Hacker
someone who accesses a computer network illegally
Cracker
someone who accesses a computer network illegally but has bad intents
Script Kiddie
someone with the same intent as a cracker but doesn't have the technical skills
Corporate spies
people hired to break into computers and stealm data
Cyberterorist
someone who uses e-mail as a vechicle for extortion
Malware(malisious software)
programs that act and alter the computer with out the users knowledge
Payload
the destructive event or prank a program is intended to deliver
Bonet
a group of comprosed computers that uses a part of a network that attacks other networks
Zombie
one whose owner is unaware the computer is being controlled by an outsider
DoS attack(denile of service)
an assault whose purpose is to disrupt computer access to an Internet service
back door
a program that allows a users to bypass a security control on a program
Spoofing
a technique intruders use to make their network look real to a victim
CAPTCHA
Completely Automated Public Testing test to tell Computer and Humans Apart,verifies a user is real
Hardware Theft
the act of stealing a computer equipment
Hardware vandalism
the act of defacing or defacing or destroying computer equipment
Software theft
occurs when someone steals software media, earses a program, copies a program, or activates a program
Licence agreement
the right to use the software
Information theft
occurs when someone steals personal or confidential information
Encyrption
the process of converting readable data into unreadable characters
Decyrpt
to decipher something
Digital signature
an encyption code that some attaches to a electronic message to verify it's the person
System faliure
the prolonged malfuction of a computer
War driving
attepting to detect wireless networks from a mobie device while driving
Wi-Fi protected Access(WPA)
a security standard that improves on older security standards by authenicating network
802.11 or WPA2
the most recent network security standard
Repetitive strain injury(RSI)
an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
Coputer vision sydrome(CVS)
a health related concern with your eyes
Intellectual property rights
rights to which creator entitle to work
Copyright
gives author exclusive rights to his/her work
green computing
reducing the electricity and environmental waste while using a computer
ENERGY STAR program
helps reduce the amout of electricity used by computers or other devices
Cookie
a small text file that a Web server stores on your computer
Spyware
a program placed on a computer without the users knowledge
Adware
a program that displays an online advertisment in a banner or pop- up window on Web pages
Spam
an unisolated e-mail message sent to multiple recipients
Phishing
a scam in which a perpetrator sends a real looking e-mail message to obtain someones personal information
Pharming
a scam where a perpetrator attempts to obtain someones personal information except they do it via spoofing
Employee monitoring
involves the use of computers to observe, record, and reveiw an employee's use a computer
Trusted source
A person you believe won't send you a virus knowingly
Unauthorized use
Use of a computer for illegal purposes
Unauthorized access
Use of a computer network without permission
Biometric device
Authenticates a persons identity by translating a personal characteristic
Digotal Forensics
Discovery/collection/analysis of evidence found on computers
Encryption algorithm
A set of steps that convert plain text to cipher text
Encryption key
A programmed formula used to encrypt cipher text
Plain text
Readable data
Cipher text
Unreadable data
Digital Certificate
A notice confirms a user or site is real
Certificate authority
CA. An authorized person that issues/verifies digital certificates
Surge protector
Provides a stable current flow to the computer
Uninterruptible power supply UPS
A device that contains the surge protection circuits and has batteries
Backup
A copy of something that can be used if the original was lost
Restore
Copying the backup file to their original place
WAP.
An unsecured Wireless Access Point
Ergonomics
An applied science devoted to make safety into items
Computer Addiction
When someones social life is consumed by a computer
Computer Ethics
The moral guidelines that govern the use of computers
National Press Photographers
A group that opposes the manipulation of images
Information privacy
The right of individuals to deny/restrict the collection/use of their information about them
Electronic Profile
Forms online that have your information and is stored on a database
Social engineering
Gaining unauthorized access to someone's information by abusing someone's trust
Content filtering
Restricting access to certain material on the Web