Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
22 Cards in this Set
- Front
- Back
code of conduct
|
Written guidelines that helps determine whether a specific computer action is ethical or unethical.
|
|
computer crime
|
Any illegal act involving a computer.
|
|
cybercrime
|
Online or Internet-based illegal acts.
|
|
Firewall
|
Hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet.
|
|
botnet
|
Group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes.
|
|
computer ethics
|
Moral guidelines that govern the use of computers and information systems.
|
|
cookie
|
Small text file that a Web server stores on a computer.
|
|
malware
|
Short for malicious software; programs that act without a user's knowledge and deliberately alter a computer's operations.
|
|
denial of service attack
|
Assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. Also called DoS attack.
|
|
digital signature
|
Encrypted code that a person, Web site, or company attaches to an electronic message to verify the identity of the message sender.
|
|
employee monitoring
|
The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.
|
|
hacker
|
Someone who accesses a computer or network illegally.
|
|
information privacy
|
Right of individuals and companies to deny or restrict the collection and use of information about them.
|
|
information theft
|
Computer security risk that occurs when someone steals personal or confidential information.
|
|
license agreement
|
An agreement issued by a software manufacturer that gives the user the right to use the software.
|
|
phishing
|
Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information.
|
|
secure site
|
Web site that uses encryption techniques to secure its data
|
|
spoofing
|
Technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
|
|
back door
|
Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
|
|
biometric device
|
Device that authenticates a person's identity by translating a personal characteristic, such as a finger print, into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic.
|
|
digital forensics
|
The discovery, collection, and analysis of evidence found on computers and networks. Also called computer forensics, network forensics, or cyberforensics.
|
|
Web filtering software
|
Program that restricts access to certain material on the Web.
|