Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/37

Click to flip

37 Cards in this Set

  • Front
  • Back
any illegal act involving a computer
computer crime
when an individual gains access to a computer or computer resource without permission
unauthorized access
using a computer resource for unapproved activities
unauthorized use
the act of breaking into a remote computer system, often via the Internet or a wireless network
hacking
an act of malicious destruction to a computer or computer resource
computer sabotage
a small software program installed without the permission or knowledge of the user that is designed to alter the way a computer operates.
computer virus
similar to a virus but does not infect other files to replicate itself; it sends copies of itself instead.
computer worm
masquerades as a legitimate program, but does its damage when the program is run.
trojan horse
attempts to flood a network or Web server with so many requests that it shuts down
denial of service attacks
verify the person requesting access is listed as an authorized user, but can't tell if the person is really the individual he or she claims to be.
identification system
verify the person requesting access is who she or he claim to be.
authentication systems
requires the individual requesting access to provide information that only the authorized user is supposed to know.
possessed knowledge access system
use physical objects for identification purposes
possessed object access systems
use biometric readers to identify users by a particular unique biological characteristic
biometric access systems
a security system that acts as a protective boundary between a computer network and the outside world
firewall
should be installed to protect against becoming infected with a computer virus or other type of malware
antivirus software
a technique used to secure email messages or other documents sent over the Internet
encryption
uses a single key to both encrypt and decrypt the file
private key encryption
uses two keys: one to encrypt the file and one to decrypt the file
public key encryption
encrypted email is sent and retrieve via a secure server
web based encrypted email
protected against unauthorized access and encrypts data going to and coming from the server.
secure web server
a booming area of computer crime that involves online theft, fraud, scams, and related activities.
dot cons
when someone obtains enough personal information about a person to be able to masquerade as the person for a variety of activities.
identity theft
occurs when a buyer pays for merchandise that is never delivered, or is delivered but is not as represented.
online auction fraud
a wide range of scams offered through Web sites or unsolicited emails, such as: loans scams, work at home cons, bogus credit card offers.
internet offer scams
making it appear that an email or a web site originates from somewhere other than its actual source
spoofing or phishing
used to verify the identity of the sender of a document
digital signatures
a group of electronic data assigned to an individual or company to be used to encrypt files, digitally sign files and email messages, verify the identity of a person or secure web site.
digital certificates
occurs when hardware is stolen
hardware theft
the complete malfunction of a computer system
system failure
protect against damage due to power fluxuations
surge suppressors
provide continuous power to a PC so it doesn't shut off when the power goes off
uninterruptible power supplies
making a duplicate copy of important files so that when a problem occurs, those files can be restored from the backup copy
backup
what the organization will do to prepare for and recover from a disruptive event
disaster recovery plan
the unauthorized copying of a computer program
software piracy
the process of creating copies of currency and other printed resources using computers and other types of digital equipment
digital counterfeiting
repeated threats or harassing behavior via email or another Internet communications method
cyberstalking