Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
64 Cards in this Set
- Front
- Back
antivirus software |
Software used to detect and eliminate computer viruses and other types of malware. ************************************************************************************** |
|
bot (zombie computer)
|
A computer that is controlled by a hacker or other computer criminal. *********************************************************************************** |
|
Botnet
|
A group of bots that are controlled by one individual. ************************************************************************************* |
|
code of conduct
|
Guidelines for behavior that explain acceptable computer use. ******************************************************************************** |
|
computer crime (cybercrime)
|
Any illegal act involving a computer. *********************************************************************************************************** |
|
computer sabotage
|
An act of malicious destruction to a computer or computer resource. ************************************************************************************************* |
|
computer-monitoring software
|
Software that can be used to record an individual’s computer usage, such as recording the actual keystrokes used or creating a summary of Web sites and programs accessed.
|
|
Cyberbullying
|
Children or teenagers bullying other children or teenagers via the Internet. ******************************************************************************** |
|
Cyberstalking
|
Repeated threats or harassing behavior between adults carried out via email or another Internet communications method. ***************************************** |
|
Cyberterrorism
|
An attack launched by terrorists via the Internet. ************************************************************************* |
|
data theft (information theft)
|
The theft of data or information located on or being sent from a computer. *************************************************************************************************** |
|
denial of service (DoS) attack
|
An act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function.
|
|
digital certificate
|
Electronic data used to verify the identity of a person or an organization; includes a key pair that can be used for encryption and digital signatures.
|
|
digital signature
|
A unique digital code that can be attached to a file or an email message to verify the identity of the sender and guarantee the file or message has not been changed since it was signed.
|
|
disaster recovery plan (business continuity plan)
|
A written plan that describes the steps a company will take following the occurrence of a disaster. ************************************************************************************ |
|
distributed denial of service (DDoS) attack
|
A DoS attack carried out by multiple computers. ************************************************************************************************************** |
|
dot con
|
A fraud or scam carried out through the Internet. ************************************************************************************* |
|
electronic profiling
|
Using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits.
|
|
email filter
|
A tool that automatically sorts incoming email messages based on specific criteria. ********************************************************************************************************* |
|
employee monitoring
|
Observing or reviewing employees’ actions while they are on the job. ******************************************************************************************************************** |
|
Encryption
|
A method of scrambling the contents of an email message or a file to make it unreadable if an unauthorized user intercepts it. ******************************************************************************************************** |
|
Firewall
|
A collection of hardware and/or software that protects a computer or computer network from unauthorized access. ********************************************************************************** |
|
full disk encryption (FDE) |
A technology that encrypts everything stored on a storage medium without any user interaction. *********************************************************************************** |
|
government database
|
A collection of data about people that is collected and maintained by the government. ************************************************************************************* |
|
Hack
|
To break into a computer or network. ***************************************************************************************************************************** |
|
hot site
|
An alternate location equipped with the computers and other equipment necessary to keep a business’s operations going. |
|
identity theft
|
Using someone else’s identity to purchase goods or services, obtain new credit cards or bank loans, or otherwise illegally masquerade as that individual. |
|
information privacy
|
The rights of individuals and companies to control how information about them is collected and used. ************************************************** |
|
keylogger
|
A malware program that records every keystroke on a computer and then sends the sensitive information it recorded to criminals.
|
|
Malware
|
Any type of malicious software. ***************************************************************************************************************** |
|
marketing database
|
A collection of data about people that is stored in a large database and used for marketing purposes. *********************************************************************************** |
|
online auction fraud (Internet auction fraud)
|
When an item purchased through an online auction is never delivered or delivered but not as represented by the seller. |
|
opt in
|
To request that you be included in marketing activities or that your information be shared with other companies. ********************************************************************************** |
|
opt out
|
To request that you be removed from marketing activities or that your information not be shared with other companies. ********************************************************************************** |
|
Password
|
A secret word or character combination associated with an individual. *************************************************************************************************** |
|
Pharming
|
The use of spoofed domain names to obtain personal information to use in fraudulent activities. ********************************************************************************************************* |
|
Phish
|
To use of spoofed email messages to gain credit card numbers and other personal data to be used for fraudulent purposes.
|
|
presence technology
|
Technology that enables one computing device to locate and identify the current status of another device on the same network.
|
|
Privacy
|
The state of being concealed or free from unauthorized intrusion. ************************************************************************************************************** |
|
privacy policy
|
A policy, commonly posted on a company’s Web site, that explains how personal information provided to that company will be used.
|
|
private key encryption
|
A type of encryption that uses a single key to encrypt and decrypt a file or message. ************************************************************************************************************** |
|
public key encryption
|
A type of encryption that uses key pairs to encrypt and decrypt a file or message. *************************************************************************************************************** |
|
ruggedized device
|
A device that is designed to withstand much more physical abuse than a conventional device. ****************************************************************************************** |
|
security software
|
Software, typically a suite of programs, used to protect a computer against a variety of threats. ************************************************************************************* |
|
self-encrypting hard drive
|
A hard drive that uses full disk encryption (FDE). *************************************************************************************************************** |
|
Spam
|
Unsolicited, bulk email sent over the Internet. *********************************************************************************************************************** |
|
spam filter (junk email filter)
|
An email filter used to redirect spam from a user’s Inbox. ********************************************************************************************************************** |
|
spear phishing
|
A personalized phishing scheme targeted at an individual. ************************************************************************************************************** |
|
Spoof
|
To set up a Web site that looks like a legitimate site but that collects private information from an unsuspecting user. ***************************************************************************************************** |
|
Spyware
|
A program designed to find private information on a computer and then send that information to the creator of the malware program.
|
|
surge suppressor
|
A device that protects a computer system from damage due to electrical fluctuations. ****************************************************************************************************************** |
|
system failure |
The complete malfunction of a computer system. ************************************************************************************************************** |
|
throw-away email address
|
An email address used only for nonessential purposes and activities that may result in spam; the address can be disposed of and replaced if spam becomes a problem.
|
|
Trojan horse
|
A malicious program that masquerades as something else. ******************************************************************************************************************** |
|
unauthorized access
|
Access gained to a computer, network, file, or other resource without permission. ****************************************************************************************************************** |
|
unauthorized use
|
Use of a computer resource for unauthorized activities. ******************************************************************************************************************** |
|
uninterruptible power supply (UPS)
|
A device containing a built-in battery that provides continuous power to a computer and other connected components when the electricity goes out.
|
|
video surveillance
|
The use of video cameras to monitor activities of individuals for work-related or crime-prevention purposes. ****************************************************************************************************************** |
|
virtual private network (VPN)
|
A private, secure path over the Internet that provides authorized users a secure means of accessing a private network via the Internet. |
|
Virus
|
A software program installed without the user’s knowledge that is designed to alter the way a computer operates or to cause harm to the computer system.
|
|
war driving
|
Driving around an area with a Wi-Fi-enabled computer or mobile device to find a Wi-Fi network to access and use without authorization. *************************************************************************** |
|
Wi-Fi piggybacking
|
Accessing an unsecured Wi-Fi network without authorization. ************************************************************************************************************************** |
|
Wipe
|
To overwrite a disk several times so that the data on it cannot be recovered. ************************************************************************************************ |
|
Worm
|
A malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers. |