• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/27

Click to flip

27 Cards in this Set

  • Front
  • Back
computer security risk
any event or actionthat could cause a loss of or damage to computer hardware, software, data, information, or processing capability
cyber crime
refers to on-line or internet based illegle acts
hacker
a derogatory meaning and refers to someone who accesses a computer or network illegally
cracker
also someone who accesses a computer or network illegally
script kiddie
has the same intent as a cracker but does not have the technicle skills and knowledge
cyberextortionist
someone who uses e-mmail as a vehicle for extortion
cyberterrorist
someone who uses the internet or network to destroy or damage computers for poltical reasons
virus
a potentionally damaging computer program that affects, or infects, a computer negatively by altering the way that the computer works without the user's permission
worm
a program that copies itself repeatedly, for example in memory or on network, using up resources and possibly shutting down the computer
Trojan Horse
a program that hides within or looks like a legit program
rookit
a program that hides in a computer and allows someone from a remote location to take full control of the computer
malware
short for malicious software, programs that act without a user's permission and deliberately alter the computer's operations
payload
the destructive event or prank the prgram is intended to deliver
trusted source
an organization or person you believe will not send a virus file knowingly
virus signature
a known specific patern of virus code
botnet
a group of comprised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes
denial of service attack
an assault whose purpose is to disrupt computer access such as a web or e-mail
back door
a program or set of instructions in a program that allow users to bypass security controls when accessing a program,computer, or network
spoofing
a technique intruders use to make their network or INternet transmission appear legit to a victim
firewall
hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet
personal firewall
a utility program that detects and protects a personal computer and its data from unauthorized intrusions
Intrusion Detection Software
automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access, and notifies network administrators or suspicious behavior patterns or system breaches
user name
a unique combination of characters, such as letters or numbers, that identifies one specific user
password
a private combination or characters associated with the user name that allows access to certain computer resources
CAPTCHA
a program that verifies user input is not computer generated
biometric device
authenticates a person's identity by translating a personal characteristic, such as fingerprint, into a digital code that is compared with a digital code stored in the computer
digital forensics
the discovery, collection, and analysis of evidence found on computers and networks