Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

61 Cards in this Set

  • Front
  • Back
Computer Security Risk
any event or action that could cause a loss of or harm to anything related to computers
Computer Crime
an illegal act involving acts
online or internet based illegal acts
someone who accesses a computer or network illegally
a hacker that has the intent of destroying data or stealing information
script kiddle
a cracker that does not have technical skills and knowledge
corporate spies
people hired to break into a computer or network
someone who uses email as a vehicle for extortion
programs altering a computer without the user knowing
destructive event or prank the program is intended to deliver
Trusted source
organization or person you believe will not send you a virus on purpose
group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks usually for nefarious purposed
a compromised computer that is unknownly controlled by an outside source
an assault whose purpose is to disrupt computer access to an internet service such as the web or e-mail
Back Door
program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer or network
a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
Unauthorized Use
the use of a computer or its data for unapproved or possibly illegal activities
Unauthorized Access
use of a computer or network without permission
program that verifies user input between human and computer input
Possessed Object
an item you must carry to gain access to a computer or computer security
Biometric Device
authenticates a person's identity by translating a personnal characteristic code and then compares it to the stored digital code
Digital Forensics
the discovery collection and analysis of evidence found on computers and networks
hardware theft
the act of stealing computer equipment
hardware vandalism
act of defacing or destroying computer equipment
software theft
occurs when someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers and/or activates a program.
license agreement
right to use a software
information theft
occurs when someone steals personal or confidential information
process of converting readable data into unreadable characters to prevent unauthorized access
decipher into readable form
encryption algorithm
set of stpes that can convert readable plaintext into unreadable ciphertext
encryption key
programmed formula that the originator of the data uses to encrypt the plaintext and recipient of the data users to decrypt the cyphertext
readable data
digital signature
encrypted code that a person or organization attaches to an electronic message to verify the identity of the message sender
Digital Certificate
contains information such as the user'sname, the issuing CA's name and signature, and theserial number of the certificate
Certificate Authority
an authorized person or a company that issues and verifies digital certificates
system failure
prolonged malfunction of a computer
surge protector
uses special electrical componentns to provide a stable current flow to the computer and other electronic equipment
(uninterruptable power supply) device that contains surge protection circuits and one or more batteries that can provide power during a loss of power
duplicate file, program, or disk that can be used if the original is lost, damaged or destroyed
restore files by copying the backed up files to their original location on the computer
repetitive strain injury; an injury or disorder of the muscles, nerves, tendons, lagaments, and joints
computer vision syndrome: computer health related issue for prolonged use
an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
Computer Addiction
occurs when the computer consumes one's entire social life
Computer Ethics
moral guidelines that govern the use of computers abd information sciences
National Press Photographers
believes that allowing even the slightest alteration could lead to misinterpretation
intellectual property rights
creators are entitled for their work
gives authors and artists exclusive rights to duplicate, publish, and sell their materials
green computing
involves reducing the electricity and environmental waste while using a computer
Energy Star Program
government program to help reduce the amount of electricity used by computers and related devices
information privacy
refers to the right of individuals and comanies to denny or restrict the collection and use of info about them
electronic profile
your information of a database
small text file that a Web server stores on your computer
program placed on a computer without the user's knowledge that secretly collects info
program that displays an online advertisement in a banner or pop-up window on Web pages, email messages, or other internet services
an unsolicited e-mail messgae or newsgroup posting sent to multiple recipients or newsgroups at once
a scam in which a perpetruder sends an official looking em-mail message that attempts to obtain your personal info
scam, similar to phishing, where a perpetruder attempts to obtain your personal and financial info
Social engineering
gaining unauthorized access or obtaining confidential info by taking advantage of the trusting nature of some visctims and the nivety of others
Content filtering
process of restricting access to certain material on the wenb
employee monitering
use of computers to observe, record, and review an employees use of a computer, including e-mails, keyboard activity, and web sites visited