Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
27 Cards in this Set
- Front
- Back
computer security risk
|
any event or actionthat could cause a loss of or damage to computer hardware, software, data, information, or processing capability
|
|
cyber crime
|
refers to on-line or internet based illegle acts
|
|
hacker
|
a derogatory meaning and refers to someone who accesses a computer or network illegally
|
|
cracker
|
also someone who accesses a computer or network illegally
|
|
script kiddie
|
has the same intent as a cracker but does not have the technicle skills and knowledge
|
|
cyberextortionist
|
someone who uses e-mmail as a vehicle for extortion
|
|
cyberterrorist
|
someone who uses the internet or network to destroy or damage computers for poltical reasons
|
|
virus
|
a potentionally damaging computer program that affects, or infects, a computer negatively by altering the way that the computer works without the user's permission
|
|
worm
|
a program that copies itself repeatedly, for example in memory or on network, using up resources and possibly shutting down the computer
|
|
Trojan Horse
|
a program that hides within or looks like a legit program
|
|
rookit
|
a program that hides in a computer and allows someone from a remote location to take full control of the computer
|
|
malware
|
short for malicious software, programs that act without a user's permission and deliberately alter the computer's operations
|
|
payload
|
the destructive event or prank the prgram is intended to deliver
|
|
trusted source
|
an organization or person you believe will not send a virus file knowingly
|
|
virus signature
|
a known specific patern of virus code
|
|
botnet
|
a group of comprised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes
|
|
denial of service attack
|
an assault whose purpose is to disrupt computer access such as a web or e-mail
|
|
back door
|
a program or set of instructions in a program that allow users to bypass security controls when accessing a program,computer, or network
|
|
spoofing
|
a technique intruders use to make their network or INternet transmission appear legit to a victim
|
|
firewall
|
hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet
|
|
personal firewall
|
a utility program that detects and protects a personal computer and its data from unauthorized intrusions
|
|
Intrusion Detection Software
|
automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access, and notifies network administrators or suspicious behavior patterns or system breaches
|
|
user name
|
a unique combination of characters, such as letters or numbers, that identifies one specific user
|
|
password
|
a private combination or characters associated with the user name that allows access to certain computer resources
|
|
CAPTCHA
|
a program that verifies user input is not computer generated
|
|
biometric device
|
authenticates a person's identity by translating a personal characteristic, such as fingerprint, into a digital code that is compared with a digital code stored in the computer
|
|
digital forensics
|
the discovery, collection, and analysis of evidence found on computers and networks
|