Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
22 Cards in this Set
- Front
- Back
Identity Theft
|
The illegal assumption of someone's identity for purposes of economic growth.
|
|
Mistaken Identity
|
The electronic profile of one person is switched with another.
|
|
Snoopware
|
Programs that record virtually every activity on a computer.
|
|
Illusion of Anonymity
|
The misconception that being selective about disclosing personal info on the Internet can prevent an invasion of personal privacy.
|
|
History File
|
Includes the locations of sites visited by your computer system.
|
|
Cookies
|
Specialized programs that are desposited on your hard disk from Web sites you have visited.
1). Traditional (monitor activities at a single site) 2). Ad network/Adware (monitor your activities across all sites you visit) |
|
Cookie Cutter Programs
|
Allow users to selectively filter or block the most intrusive cookies while allowing selective traditional cookies to operate.
-ex: AdSubtract, Cookie Cleanup, Cookie Crusher, Cookie Pal, WebWasher |
|
Spyware
|
Describes a wide range of programs that are designed to secretly record and report an individual's activities on the Internet.
|
|
Info Reseller/Info Broker
|
Data gatherers that collect and sell personal data. Create electronic profiles (highly detailed and personalized descriptions of individuals)
|
|
Computer Crime and 5 Types
|
Illegal action in which the perpetrator uses special knowledge of computer technology.
1). Employees (biggest category) 2). Outside Users (suppliers/clients- bank) 3). Hackers/Crackers 4). Organized Crime (counterfiiters and forgers) 5). Terrorists |
|
Hackers and Crackers
|
Hackers: ppl who gain unauthorized access to a computer system for the fun and challenge of it.
Crackers: do same thing but for malicious purposes. |
|
Viruses
|
Programs that migrate through networks and operating systems and most attach themselves to different programs and databases.
|
|
Worms
|
Special type of virus that doesn't attach itself to programs and databases, but fills the system with self replicating info to clog the system.
|
|
Trojan Horses
|
Programs that come into a computer system disguised as something else. Not viruses, but carriers of viruses.
|
|
Denial of Service Attack (DoS)
|
Attempts to slow down or stop a computer system or network.
|
|
Software Piracy
|
Unauthorized copying of programs for personal gain
|
|
Other Hazards
|
1). Natural hazards
2). Civil strife and terrorism 3). Technological failures 4). Human errors |
|
Security
|
Concerned with protecting info, hardware, and software, which must be protected from unauthorized use as well as from damage from intrusions, sabotage, and natural disasters.
|
|
Measures to Protect Computer Security
|
1). Encrypting (code all messages sent over a network)
2). Restricting (limit acces to authorized ppl thru passwords, dial-back systems, and firewalls) 3). Anticipating (prepare for disasters with physical and data security thru disaster recovery plan) 4). Backing Up (routinely copy data and store it at a remote location) |
|
Firewalls
|
Act as a security buffer b/t the corporation's private and external networks, including the Internet.
|
|
Ergonomics
|
The study of human factors related to things ppl use. (fitting job to worker not worker comfoming to job)
|
|
Green PC
|
Microcomputer industry concept of an environmentally friendly, low power consuming machine.
|