• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back

code of cunduct

written guidelines

computer crime

an illegal act pefrom on any computer

cyber crime

online based illegal acts

firewall

hardware that protects a networks

botnet

a group of compromised computers

computer ethics

guidelines that govern the use of computer

cookies

small text flie web server stores on a server

malware

program that acts without a user acknowledge

denail of service attack

attack on computer access to the internet

digtal signature

Encrypted code that a person, Web site, or company attaches to an electronic message to verify the identity of the message sender.

employee montering

The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity

encryption

Process of converting readable data into unreadable characters to prevent unauthorized access

hacker

Someone who accesses a computer or network illegally.

information privacy

Right of individuals and companies to deny or restrict the collection and use of information about them.

info theft


Computer security risk that occurs when someone steals personal or confidential information.

;icense agreement

An agreement issued by a software manufacturer that gives the user the right to use the software.

license agreement

An agreement issued by a software manufacturer that gives the user the right to use the software.

phishing

Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information.

secure site

Web site that uses encryption techniques to secure its data.

spoofing

Technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.

back door

Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.

biometric device

Device that authenticates a person's identity by translating a personal characteristic, such as a finger print, into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic.

digital forensics

The discovery, collection, and analysis of evidence found on computers and networks. Also called computer forensics, network forensics, or cyberforensics.

web filtering software

Program that restricts access to certain material on the Web