Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
24 Cards in this Set
- Front
- Back
code of cunduct |
written guidelines |
|
computer crime |
an illegal act pefrom on any computer |
|
cyber crime |
online based illegal acts |
|
firewall |
hardware that protects a networks |
|
botnet |
a group of compromised computers |
|
computer ethics |
guidelines that govern the use of computer |
|
cookies |
small text flie web server stores on a server |
|
malware |
program that acts without a user acknowledge |
|
denail of service attack |
attack on computer access to the internet |
|
digtal signature |
Encrypted code that a person, Web site, or company attaches to an electronic message to verify the identity of the message sender. |
|
employee montering |
The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity |
|
encryption |
Process of converting readable data into unreadable characters to prevent unauthorized access |
|
hacker |
Someone who accesses a computer or network illegally. |
|
information privacy |
Right of individuals and companies to deny or restrict the collection and use of information about them. |
|
info theft
|
Computer security risk that occurs when someone steals personal or confidential information. |
|
;icense agreement |
An agreement issued by a software manufacturer that gives the user the right to use the software. |
|
license agreement |
An agreement issued by a software manufacturer that gives the user the right to use the software. |
|
phishing |
Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information. |
|
secure site |
Web site that uses encryption techniques to secure its data. |
|
spoofing |
Technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. |
|
back door |
Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network. |
|
biometric device |
Device that authenticates a person's identity by translating a personal characteristic, such as a finger print, into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic. |
|
digital forensics |
The discovery, collection, and analysis of evidence found on computers and networks. Also called computer forensics, network forensics, or cyberforensics. |
|
web filtering software |
Program that restricts access to certain material on the Web |