• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/71

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

71 Cards in this Set

  • Front
  • Back
Any illegal act involving a computer
Computer Crime
occurs whenever an individual gains access to a computer network, file, or other resource without permission.
Unauthorized access
using a computer resource for unauthorized activities
unauthorized use
T/F unauthorized use can occur even if the user is authorized to access that computer or network but is not authorized for that particular activity.
T
using a computer to break into another computer system
Hacking
sets of tools that allows hackers to access a system
root kits
terrorists launch attacks via the internet
cyberterrorism
people that perform authorized hacks
white hat hackers
hackers that break the law
black hat hackers
individuals who break into systems to be destructive or for material gain
cracker
hackers that break into telephone systems to make phone calls at someone else expense
phreakers
the main federal law regarding computer crime
Computer Fraud and Abuse Act
Driving around an area with a Wi-Fi enabled computer or mobile device to find a Wi-Fi network to access nd use without authorization
War driving
Accessing an unsecured Wi-Fi network from your current location without authorization
Wi-Fi piggybacking
An act of malicious destruction to a computer or computer resource
Computer sabotage
A computer that is controlled by a hacker or other computer criminal
Bot
A group of bots that are controlled by one individual
Botnet
Any type of malicious software
malware
A software program installed without the users knowledge and designed to alter the way a computer operates or to cause harm to the computer system
computer virus
A malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers
Computer worm
A malicious program that masquerades as something else
Trojan horse
An act of sabotage that attempts to flood a network server or a Web server with so much activity that is unable to function
Denial of service (Dos) attack
A comprehensive system that controls the initial access to a computer system
Network access control (NAC) system
An access control system that uses information only the individual should know to identify that individual
Possessed Knowledge Access system
A secret combination of characters used to gain access to a computer, computer network, or other resource
Password
An access control system that uses physical objects an individual has in his or her possession to identify that individual
Possessed object access system
An access control system that uses one unique physical characteristic of an individual to authenticate that individual
Biometric access system
T/F Trojan horse can not replicate themselves, and spreads by being downloaded
True
activates when it detects a certain condition
Logic bomb virus
not designed to do any permanent damage
Benign virus
logic bomb whose trigger is a particular date or time
Time bomb
T/F writing a computer malware is illegal
False
T/F Distributing malware is illegal
True
designed to take control of peoples PC's in order to hijack them for spam distribution and to perform denial of service attacks
Storm worm
Dos Attacks that utilize multiple computers
Distributed denial of service attack
defacing or otherwise changing websites without permission
Web site Defacement
T/F Access control systems can be used as identification systems
True
used to generate a new pass-code every 30 or 60 seconds
security token
uses information that an individual should know or easily can remember
cognitive authentication
using two different methods to authenticate a user
two-factor authentication
flash memory drives that are inserted into a PC to grant access to a network,to supply web site user-names and passwords, or to provide other security features
e-tokens
used to recognize an individuals unique typing pattern
keystroke dynamics
T/F Biometric access systems can only perform identification
F- authentication and identification
using a combination of biometric features
fusion biometrics/ multi-modal biometrics
a piece of hardware containing a set of preinstalled security software that connects to a network to secure it
Security appliance
A collection of hardware and/or software intended to protect a computer or computer network from unauthorized access
Firewall
software-based systems that are geared toward protecting home Pcs from hackers attempting to access those computers through their internet connection
Personal firewalls
T/F Routers. modems, other networking hardware also include built-in firewalls to help secure the networks
True
the electronic connections that allow a PC to communicate with other computers, to unauthorized computers and programs
External communications port address
continuously monitors and analyzes the traffic allowed by the firewall to try to detect possible attacks as they are occurring
Intrusion prevention systems (IPS)
a Microsoft technology that allows websites and e-mail attachments to run executable programs on users PCs
ActiveX
A method of scrambling e-mail or files to make them unreadable if they are intercepted by an unauthorized user
Encryption
A web page that use Encryption to protect information transmitted via that web page
Secure Web page
The most common security protocols used with secure web pages are Secure Sockets Layer (SSL) and Extended Validation Secure Sockets Layer
True
A private, secure path over the internet that provides authorized users a secure means of accessing a private network Via the internet
Virtual private Network
Software used to detect and eliminate computer viruses and other types of malware
Anti-virus software
a process in which students are not granted accesss to the college network until they complete a security process that checks their PCs for security threats, updates their operating systems, and installs anti virus software
Quarantine
protects against viruses sent via e-mail
e-mail authentication system
states that employees should be granted the least amount of access to the company network that they need to perform their job
The principle of least privilege
trying to trick your employees with spear phishing and other schemes that result in downloading malware or revealing sensitive information
inoculation
using someone elses identity to purchase goods or services, obtain new credit cards or bank loans, or otherwise illegally masquerade as that individual
Identity theft
occurs when an online auction buyer pays for merchandise that is never delivered, or that is delivered but not represented
Online Auction fraud
A software program installed without the users knowledge that secretly collects information and sends it to an outside party via the users internet connection
Spyware
aggressive spy ware that deliver ads regardless of the activity you are doing on your pc, changing your browser home page or resetting your browser settings
stealthware
spyware program changes your browser settings back to the hijacked settings each time you reboot your PC
Windows Registry
A unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been changed since it was signed
Digital signature
A group of electronic data such as encryption key pairs and digital signature that can be used to verify the identity of a person or organization
Digital certificate
bullying an individual via the internet
Cyberbullying
Repeated threats or harassing behavior via e-mail or another internet communications method
cyberstalking
includes a security rule that sets minimum security standards to protect health information stored electronically
Health insurance portability and Accountability act
grants federal authorities expanded surveillance
USA patriot Act