• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back
code of conduct
Written guidelines that helps determine whether a specific computer action is ethical or unethical.
computer crime
Any illegal act involving a computer.
cybercrime
Online or Internet-based illegal acts.
Firewall
Hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet.
botnet
Group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes.
computer ethics
Moral guidelines that govern the use of computers and information systems.
cookie
Small text file that a Web server stores on a computer.
malware
Short for malicious software; programs that act without a user's knowledge and deliberately alter a computer's operations.
denial of service attack
Assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. Also called DoS attack.
digital signature
Encrypted code that a person, Web site, or company attaches to an electronic message to verify the identity of the message sender.
employee monitoring
The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.
hacker
Someone who accesses a computer or network illegally.
information privacy
Right of individuals and companies to deny or restrict the collection and use of information about them.
information theft
Computer security risk that occurs when someone steals personal or confidential information.
license agreement
An agreement issued by a software manufacturer that gives the user the right to use the software.
phishing
Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information.
secure site
Web site that uses encryption techniques to secure its data
spoofing
Technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
back door
Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
biometric device
Device that authenticates a person's identity by translating a personal characteristic, such as a finger print, into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic.
digital forensics
The discovery, collection, and analysis of evidence found on computers and networks. Also called computer forensics, network forensics, or cyberforensics.
Web filtering software
Program that restricts access to certain material on the Web.