Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
66 Cards in this Set
- Front
- Back
computer security risk
|
any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability
|
|
computer crime
|
any illegal act involving a computer generally is referred
|
|
cybercrime
|
refers to online or Internet-based illegal acts
|
|
Hacker
|
refers to someone who accesses a computer or network illegally
|
|
cracker
|
someone who accesses a computer or network illegally but has the intent of destroying data, stealing info
|
|
script kiddie
|
the same intent as a cracker but does not have the technological skills and knowledge
|
|
computer spies
|
computer and networking skills and are hired to break into a specific computer and steal its property data and info
|
|
cyberextortionist
|
someone who uses e-mail as a vehicle for extortion
|
|
malware
|
(malicious software) programs that act without a user's knowledge and deliberately alter the computer's operations
|
|
payload
|
the event or prank the program is intended to deliver
|
|
trusted source
|
organization or person you believe will not send a virus infected file knowingly
|
|
botnet
|
group of compromised computers connected to a network such as the internet that is used or part of a network that attracts other networks
|
|
zombie
|
a compromised computer, one whose owner is unaware the computer is being controlled remotely by an outseider
|
|
DoS attack
|
(denial of service attack) an assault whose purpose is to disrupt computer access to an internet service
|
|
back door
|
a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer
|
|
spoofing
|
a technique intruders use to make their network or internet transmission appear legitiment to a victim's computer
|
|
unauthorized use
|
the use of a computer or its data for unappeared or possible illegal activites
|
|
unauthorized access
|
the use of a computer or network without permission
|
|
CAPTCHA
|
(completely authomated public test that can tell computers and humans apart) program that vertifies users input from computer generaters
|
|
Possessed Object
|
any item that you must carry to gain access to a computer or computer facility
|
|
Biometric Device
|
authenticates a person's identity by translating a personal characteristic, such as a fingerprint
|
|
Digital Forensics
|
computer forensics, network forensics or cyberforensics, the discovering collection and analysis of evidence
|
|
Hardware Theft
|
the act of stealing computer equipment
|
|
hardware vandalism
|
the act of defacing or destroying computer equipment
|
|
software theft
|
someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers or activates a program
|
|
license agreement
|
the right to use the software
|
|
information theft
|
someone steals personal or confidential information
|
|
encryption
|
the process of converting readable data in unreadable characters to prevent unauthorized access
|
|
decrypt
|
decipher, into a readable form
|
|
encryption algorithm
|
set of steps that can convert readable plaintext into unreadable cypertexts
|
|
encryption key
|
a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decipher the ciphertext
|
|
plaintext
|
intelligent original mistage of a cytoprogram
|
|
ciphertext
|
the extended vision of a message
|
|
digital signature
|
an encrypted code that a person, web site, or organization attaches to an electronic message
|
|
digital certificate
|
a notice that guarantees a user or a web site is legitmate
|
|
certificate authority
|
an authorized person or a company that issues and vertifies digital certificates
|
|
system failure
|
the prolonged malfunction of a computer
|
|
surge protector
|
special electrical components to provide a stable convert flow and the computer and other electric equipment
|
|
UPS
|
(uninterrupted power supply) device that contains surge protection circuits and one or more batteries thatr can provide power
|
|
backup
|
a duplicate of a file, program, or disk that can be used if the original is lose, damaged, or destroyed
|
|
restore
|
copying the backed up files to their original location on the computer
|
|
WAP
|
(wireless access point) configured so that it does not broadcast a network name
|
|
War Driving
|
individuals attempt to distant wireless networking view
|
|
WPA
|
(wi-Fi protected access) a secruity standard that improves an older security standard that improves an older security standards by unauthorized network users
|
|
802.11i or WPA 2
|
the must recent network security standard, confirms to the gov. security standards
|
|
RSI
|
(repetitive strain injury) an injury or disorder of muscles, tenderness, legiments, and joints
|
|
CVS
|
(computer vision syndrome) causes your eyes to be sore, tired, burning, itching, or dry
|
|
ergonomics
|
applied science devoted to incoporation comfort, efficency and safety into the design of items in workplace
|
|
computer addiction
|
the computer consumes someones entire social life
|
|
computer ethics
|
the moral guidelines that govern the use of computer and information system
|
|
National Press Photographers
|
they believe that allowing even the slightest alternative could lead to misrepresention
|
|
intellectual property rights
|
the rights to which creators are entitled for their work
|
|
copyright
|
authors and artists exclusive rights and duplication
|
|
green computing
|
involves reducing the electricity and enviromental waste while using a computer
|
|
energy star program
|
to help reduce the amount of electricity used by computer and related devices
|
|
information privacy
|
refers to the right of individuals to compare and identy or restruct the collection and use of info about them
|
|
electronic profile
|
when you fill out a form, the merchants recieves the form and just enters it into the system
|
|
cookie
|
a small text file that a web server has
|
|
spyware
|
a program placed on a computer w/o the user's knowledge
|
|
adware
|
a program that displays an online advertisement in a browser or pop-up window
|
|
spam
|
an unsolicated e-mail message or newsgroup posting sent to multiple reciprients
|
|
phishing
|
a scam in which a perpetrictor sends an official looking e-mail message that attempts to obtain your personal and financial info
|
|
pharming
|
a scam, similar to phishing, when a person attempts to obtain your personal and financial info
|
|
social engineering
|
gaining unauthorized access or obtaining information by taking advantage of restoring human nature
|
|
employee monitoring
|
the use of computers to observe, record, and receive are employee's use of the computer
|
|
content filtering
|
the process of restricting access to certain material on the web.
|