• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/66

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

66 Cards in this Set

  • Front
  • Back
computer security risk
any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability
computer crime
any illegal act involving a computer generally is referred
cybercrime
refers to online or Internet-based illegal acts
Hacker
refers to someone who accesses a computer or network illegally
cracker
someone who accesses a computer or network illegally but has the intent of destroying data, stealing info
script kiddie
the same intent as a cracker but does not have the technological skills and knowledge
computer spies
computer and networking skills and are hired to break into a specific computer and steal its property data and info
cyberextortionist
someone who uses e-mail as a vehicle for extortion
malware
(malicious software) programs that act without a user's knowledge and deliberately alter the computer's operations
payload
the event or prank the program is intended to deliver
trusted source
organization or person you believe will not send a virus infected file knowingly
botnet
group of compromised computers connected to a network such as the internet that is used or part of a network that attracts other networks
zombie
a compromised computer, one whose owner is unaware the computer is being controlled remotely by an outseider
DoS attack
(denial of service attack) an assault whose purpose is to disrupt computer access to an internet service
back door
a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer
spoofing
a technique intruders use to make their network or internet transmission appear legitiment to a victim's computer
unauthorized use
the use of a computer or its data for unappeared or possible illegal activites
unauthorized access
the use of a computer or network without permission
CAPTCHA
(completely authomated public test that can tell computers and humans apart) program that vertifies users input from computer generaters
Possessed Object
any item that you must carry to gain access to a computer or computer facility
Biometric Device
authenticates a person's identity by translating a personal characteristic, such as a fingerprint
Digital Forensics
computer forensics, network forensics or cyberforensics, the discovering collection and analysis of evidence
Hardware Theft
the act of stealing computer equipment
hardware vandalism
the act of defacing or destroying computer equipment
software theft
someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers or activates a program
license agreement
the right to use the software
information theft
someone steals personal or confidential information
encryption
the process of converting readable data in unreadable characters to prevent unauthorized access
decrypt
decipher, into a readable form
encryption algorithm
set of steps that can convert readable plaintext into unreadable cypertexts
encryption key
a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decipher the ciphertext
plaintext
intelligent original mistage of a cytoprogram
ciphertext
the extended vision of a message
digital signature
an encrypted code that a person, web site, or organization attaches to an electronic message
digital certificate
a notice that guarantees a user or a web site is legitmate
certificate authority
an authorized person or a company that issues and vertifies digital certificates
system failure
the prolonged malfunction of a computer
surge protector
special electrical components to provide a stable convert flow and the computer and other electric equipment
UPS
(uninterrupted power supply) device that contains surge protection circuits and one or more batteries thatr can provide power
backup
a duplicate of a file, program, or disk that can be used if the original is lose, damaged, or destroyed
restore
copying the backed up files to their original location on the computer
WAP
(wireless access point) configured so that it does not broadcast a network name
War Driving
individuals attempt to distant wireless networking view
WPA
(wi-Fi protected access) a secruity standard that improves an older security standard that improves an older security standards by unauthorized network users
802.11i or WPA 2
the must recent network security standard, confirms to the gov. security standards
RSI
(repetitive strain injury) an injury or disorder of muscles, tenderness, legiments, and joints
CVS
(computer vision syndrome) causes your eyes to be sore, tired, burning, itching, or dry
ergonomics
applied science devoted to incoporation comfort, efficency and safety into the design of items in workplace
computer addiction
the computer consumes someones entire social life
computer ethics
the moral guidelines that govern the use of computer and information system
National Press Photographers
they believe that allowing even the slightest alternative could lead to misrepresention
intellectual property rights
the rights to which creators are entitled for their work
copyright
authors and artists exclusive rights and duplication
green computing
involves reducing the electricity and enviromental waste while using a computer
energy star program
to help reduce the amount of electricity used by computer and related devices
information privacy
refers to the right of individuals to compare and identy or restruct the collection and use of info about them
electronic profile
when you fill out a form, the merchants recieves the form and just enters it into the system
cookie
a small text file that a web server has
spyware
a program placed on a computer w/o the user's knowledge
adware
a program that displays an online advertisement in a browser or pop-up window
spam
an unsolicated e-mail message or newsgroup posting sent to multiple reciprients
phishing
a scam in which a perpetrictor sends an official looking e-mail message that attempts to obtain your personal and financial info
pharming
a scam, similar to phishing, when a person attempts to obtain your personal and financial info
social engineering
gaining unauthorized access or obtaining information by taking advantage of restoring human nature
employee monitoring
the use of computers to observe, record, and receive are employee's use of the computer
content filtering
the process of restricting access to certain material on the web.