• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back
Identity Theft
The illegal assumption of someone's identity for purposes of economic growth.
Mistaken Identity
The electronic profile of one person is switched with another.
Snoopware
Programs that record virtually every activity on a computer.
Illusion of Anonymity
The misconception that being selective about disclosing personal info on the Internet can prevent an invasion of personal privacy.
History File
Includes the locations of sites visited by your computer system.
Cookies
Specialized programs that are desposited on your hard disk from Web sites you have visited.
1). Traditional (monitor activities at a single site)
2). Ad network/Adware (monitor your activities across all sites you visit)
Cookie Cutter Programs
Allow users to selectively filter or block the most intrusive cookies while allowing selective traditional cookies to operate.
-ex: AdSubtract, Cookie Cleanup, Cookie Crusher, Cookie Pal, WebWasher
Spyware
Describes a wide range of programs that are designed to secretly record and report an individual's activities on the Internet.
Info Reseller/Info Broker
Data gatherers that collect and sell personal data. Create electronic profiles (highly detailed and personalized descriptions of individuals)
Computer Crime and 5 Types
Illegal action in which the perpetrator uses special knowledge of computer technology.
1). Employees (biggest category)
2). Outside Users (suppliers/clients- bank)
3). Hackers/Crackers
4). Organized Crime (counterfiiters and forgers)
5). Terrorists
Hackers and Crackers
Hackers: ppl who gain unauthorized access to a computer system for the fun and challenge of it.

Crackers: do same thing but for malicious purposes.
Viruses
Programs that migrate through networks and operating systems and most attach themselves to different programs and databases.
Worms
Special type of virus that doesn't attach itself to programs and databases, but fills the system with self replicating info to clog the system.
Trojan Horses
Programs that come into a computer system disguised as something else. Not viruses, but carriers of viruses.
Denial of Service Attack (DoS)
Attempts to slow down or stop a computer system or network.
Software Piracy
Unauthorized copying of programs for personal gain
Other Hazards
1). Natural hazards
2). Civil strife and terrorism
3). Technological failures
4). Human errors
Security
Concerned with protecting info, hardware, and software, which must be protected from unauthorized use as well as from damage from intrusions, sabotage, and natural disasters.
Measures to Protect Computer Security
1). Encrypting (code all messages sent over a network)
2). Restricting (limit acces to authorized ppl thru passwords, dial-back systems, and firewalls)
3). Anticipating (prepare for disasters with physical and data security thru disaster recovery plan)
4). Backing Up (routinely copy data and store it at a remote location)
Firewalls
Act as a security buffer b/t the corporation's private and external networks, including the Internet.
Ergonomics
The study of human factors related to things ppl use. (fitting job to worker not worker comfoming to job)
Green PC
Microcomputer industry concept of an environmentally friendly, low power consuming machine.