• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/64

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

64 Cards in this Set

  • Front
  • Back

antivirus software

Software used to detect and eliminate computer viruses and other types of malware. **************************************************************************************

bot (zombie computer)

A computer that is controlled by a hacker or other computer criminal. ***********************************************************************************

Botnet

A group of bots that are controlled by one individual. *************************************************************************************

code of conduct

Guidelines for behavior that explain acceptable computer use. ********************************************************************************

computer crime (cybercrime)

Any illegal act involving a computer. ***********************************************************************************************************

computer sabotage

An act of malicious destruction to a computer or computer resource. *************************************************************************************************

computer-monitoring software
Software that can be used to record an individual’s computer usage, such as recording the actual keystrokes used or creating a summary of Web sites and programs accessed.
Cyberbullying

Children or teenagers bullying other children or teenagers via the Internet. ********************************************************************************

Cyberstalking

Repeated threats or harassing behavior between adults carried out via email or another Internet communications method. *****************************************

Cyberterrorism

An attack launched by terrorists via the Internet. *************************************************************************

data theft (information theft)

The theft of data or information located on or being sent from a computer. ***************************************************************************************************

denial of service (DoS) attack
An act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function.
digital certificate
Electronic data used to verify the identity of a person or an organization; includes a key pair that can be used for encryption and digital signatures.
digital signature
A unique digital code that can be attached to a file or an email message to verify the identity of the sender and guarantee the file or message has not been changed since it was signed.
disaster recovery plan (business continuity plan)

A written plan that describes the steps a company will take following the occurrence of a disaster. ************************************************************************************

distributed denial of service (DDoS) attack

A DoS attack carried out by multiple computers. **************************************************************************************************************

dot con

A fraud or scam carried out through the Internet. *************************************************************************************

electronic profiling
Using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits.
email filter

A tool that automatically sorts incoming email messages based on specific criteria. *********************************************************************************************************

employee monitoring

Observing or reviewing employees’ actions while they are on the job. ********************************************************************************************************************

Encryption

A method of scrambling the contents of an email message or a file to make it unreadable if an unauthorized user intercepts it. ********************************************************************************************************

Firewall

A collection of hardware and/or software that protects a computer or computer network from unauthorized access. **********************************************************************************

full disk encryption (FDE)

A technology that encrypts everything stored on a storage medium without any user interaction. ***********************************************************************************

government database

A collection of data about people that is collected and maintained by the government. *************************************************************************************

Hack

To break into a computer or network. *****************************************************************************************************************************

hot site

An alternate location equipped with the computers and other equipment necessary to keep a business’s operations going.

identity theft

Using someone else’s identity to purchase goods or services, obtain new credit cards or bank loans, or otherwise illegally masquerade as that individual.

information privacy

The rights of individuals and companies to control how information about them is collected and used. **************************************************

keylogger
A malware program that records every keystroke on a computer and then sends the sensitive information it recorded to criminals.
Malware

Any type of malicious software. *****************************************************************************************************************

marketing database

A collection of data about people that is stored in a large database and used for marketing purposes. ***********************************************************************************

online auction fraud (Internet auction fraud)

When an item purchased through an online auction is never delivered or delivered but not as represented by the seller.

opt in

To request that you be included in marketing activities or that your information be shared with other companies. **********************************************************************************

opt out

To request that you be removed from marketing activities or that your information not be shared with other companies. **********************************************************************************

Password

A secret word or character combination associated with an individual. ***************************************************************************************************

Pharming

The use of spoofed domain names to obtain personal information to use in fraudulent activities. *********************************************************************************************************

Phish
To use of spoofed email messages to gain credit card numbers and other personal data to be used for fraudulent purposes.
presence technology
Technology that enables one computing device to locate and identify the current status of another device on the same network.
Privacy

The state of being concealed or free from unauthorized intrusion. **************************************************************************************************************

privacy policy
A policy, commonly posted on a company’s Web site, that explains how personal information provided to that company will be used.
private key encryption

A type of encryption that uses a single key to encrypt and decrypt a file or message. **************************************************************************************************************

public key encryption

A type of encryption that uses key pairs to encrypt and decrypt a file or message. ***************************************************************************************************************

ruggedized device

A device that is designed to withstand much more physical abuse than a conventional device. ******************************************************************************************

security software

Software, typically a suite of programs, used to protect a computer against a variety of threats. *************************************************************************************

self-encrypting hard drive

A hard drive that uses full disk encryption (FDE). ***************************************************************************************************************

Spam

Unsolicited, bulk email sent over the Internet. ***********************************************************************************************************************

spam filter (junk email filter)

An email filter used to redirect spam from a user’s Inbox. **********************************************************************************************************************

spear phishing

A personalized phishing scheme targeted at an individual. **************************************************************************************************************

Spoof

To set up a Web site that looks like a legitimate site but that collects private information from an unsuspecting user. *****************************************************************************************************

Spyware
A program designed to find private information on a computer and then send that information to the creator of the malware program.
surge suppressor

A device that protects a computer system from damage due to electrical fluctuations. ******************************************************************************************************************

system failure

The complete malfunction of a computer system. **************************************************************************************************************

throw-away email address
An email address used only for nonessential purposes and activities that may result in spam; the address can be disposed of and replaced if spam becomes a problem.
Trojan horse

A malicious program that masquerades as something else. ********************************************************************************************************************

unauthorized access

Access gained to a computer, network, file, or other resource without permission. ******************************************************************************************************************

unauthorized use

Use of a computer resource for unauthorized activities. ********************************************************************************************************************

uninterruptible power supply (UPS)
A device containing a built-in battery that provides continuous power to a computer and other connected components when the electricity goes out.
video surveillance

The use of video cameras to monitor activities of individuals for work-related or crime-prevention purposes. ******************************************************************************************************************

virtual private network (VPN)

A private, secure path over the Internet that provides authorized users a secure means of accessing a private network via the Internet.

Virus
A software program installed without the user’s knowledge that is designed to alter the way a computer operates or to cause harm to the computer system.
war driving

Driving around an area with a Wi-Fi-enabled computer or mobile device to find a Wi-Fi network to access and use without authorization. ***************************************************************************

Wi-Fi piggybacking

Accessing an unsecured Wi-Fi network without authorization. **************************************************************************************************************************

Wipe

To overwrite a disk several times so that the data on it cannot be recovered. ************************************************************************************************

Worm

A malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers.