• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back
Audit trail
Computer file that records both successful and unsuccessful access attempts.
Back door
Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
Code of conduct
Written guidelines that helps determine whether a specific computer action is ethical or unethical.
Computer crime
Any illegal act involving a computer.
Computer ethics
Moral guidelines that govern the use of computers and information systems.
Copyright
Exclusive rights given to authors and artists to duplicate, publish, and sell their materials.
Cybercrime
Online or Internet-based illegal acts.
Digital forensics
The discovery, collection, and analysis of evidence found on computers and networks. Also called computer forensics, network forensics, or cyberforensics.
Denial of service attack
Assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. Also called DoS attack.
Digital signature
Encrypted code that a person, Web site, or company attaches to an electronic message to verify the identity of the message sender.
Employee monitoring
The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.
See page586
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
Hacker
Someone who accesses a computer or network illegally.
Information privacy
Right of individuals and companies to deny or restrict the collection and use of information about them.
Information theft
Computer security risk that occurs when someone steals personal or confidential information.
License agreement
An agreement issued by a software manufacturer that gives the user the right to use the software.
Online security service
online security service
Web site that evaluates a computer to check for Internet and e-mail vulnerabilities.
Piracy
Unauthorized and illegal duplication of copyrighted material.
Secure site
Web site that uses encryption techniques to secure its data.
Spam
Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once.
Software theft
Computer security risk that occurs when someone (1) steals software media, (2) intentionally erases programs, or (3) illegally copies a program.
Trusted source
Company or person a user believes will not send a virus-infected file knowingly.
Unauthorized use
Use of a computer or its data for unapproved or possibly illegal activities.
Web filtering software
Program that restricts access to certain material on the Web.