Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

27 Cards in this Set

  • Front
  • Back
computer security risk
any event or actionthat could cause a loss of or damage to computer hardware, software, data, information, or processing capability
cyber crime
refers to on-line or internet based illegle acts
a derogatory meaning and refers to someone who accesses a computer or network illegally
also someone who accesses a computer or network illegally
script kiddie
has the same intent as a cracker but does not have the technicle skills and knowledge
someone who uses e-mmail as a vehicle for extortion
someone who uses the internet or network to destroy or damage computers for poltical reasons
a potentionally damaging computer program that affects, or infects, a computer negatively by altering the way that the computer works without the user's permission
a program that copies itself repeatedly, for example in memory or on network, using up resources and possibly shutting down the computer
Trojan Horse
a program that hides within or looks like a legit program
a program that hides in a computer and allows someone from a remote location to take full control of the computer
short for malicious software, programs that act without a user's permission and deliberately alter the computer's operations
the destructive event or prank the prgram is intended to deliver
trusted source
an organization or person you believe will not send a virus file knowingly
virus signature
a known specific patern of virus code
a group of comprised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes
denial of service attack
an assault whose purpose is to disrupt computer access such as a web or e-mail
back door
a program or set of instructions in a program that allow users to bypass security controls when accessing a program,computer, or network
a technique intruders use to make their network or INternet transmission appear legit to a victim
hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet
personal firewall
a utility program that detects and protects a personal computer and its data from unauthorized intrusions
Intrusion Detection Software
automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access, and notifies network administrators or suspicious behavior patterns or system breaches
user name
a unique combination of characters, such as letters or numbers, that identifies one specific user
a private combination or characters associated with the user name that allows access to certain computer resources
a program that verifies user input is not computer generated
biometric device
authenticates a person's identity by translating a personal characteristic, such as fingerprint, into a digital code that is compared with a digital code stored in the computer
digital forensics
the discovery, collection, and analysis of evidence found on computers and networks