• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/21

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

21 Cards in this Set

  • Front
  • Back
omputer security risk
any event that could cause loss of or damage to a computers hardware
computer crime
any illegal activity involving a computer
hacker
someone who accesses a computer or network illegally
cracker
someone who accesses a computer or network illegally with the intent of destroying data
script kiddie
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action but does not have the technical skills and knowledge.
corporate spies
someone who commits corporate espionage through a computer
cyberextortionist
Someone who uses e-mail as a vehicle for extortion.
malware
Short for malicious software; programs that act without a user's knowledge and deliberately alter a computer's operations.
payload
Destructive event or prank a malicious-logic program is intended to deliver.
trusted source
Company or person a user believes will not send a virus-infected file knowingly.
botnet
Group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes. See also zombie army.
zombie
A compromised computer whose owner is unaware the computer is being controlled remotely by an outsider.
DoS attack
Assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. Also called denial of service attack.
back door
Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
spoofing
Technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
unauthorized access
use of a computer or network without permission.
unauthorized
Use of a computer or its data for unapproved or possibly illegal activities.
CAPTCHA
Completely Automated Public Turing test to tell Computers and Humans Apart; program used by some Web sites to provide further protection for a user's password by verifying that user input is not computer generated.
possessed objects
Any item that a user must carry to gain access to a computer or computer facility.
biometric device
Device that authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic.
See page567
digital forensics
The discovery, collection, and analysis of evidence found on computers and networks.