Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
24 Cards in this Set
- Front
- Back
What is a computer security risk?
|
Action that causes loss of or damage to computer system
|
|
How can you make your password more secure?
|
longer passwords provide greater security
|
|
What is a virus?
|
is a potentially damaging computer program
|
|
What is a worm?
|
itself repeatedly, using up resources and possibly shutting down computer or network
|
|
What is a trojan horse?
|
hides within or looks like legitimate program until triggered
|
|
What is an antivirus program?
|
Identifies and removes computer viruses
Most also protect against worms and Trojan horses |
|
What is a virus signature?
|
Specific pattern of virus code
Also called virus definition Antivirus programs look for virus signatures |
|
What is a denial service attack?
|
is an assault whichdisrupts computer access to an Internet service such as the Web or e-mail
|
|
What is a back door?
|
is a program or set of instructionsin a program that allow users to bypasssecurity controls when accessing a computerresource
|
|
What is a possessed oject?
|
item that you must carry to gain access to computer or facility.
|
|
What is spoofing?
|
IP spoofing occurs when an intrudercomputer fools a network into believingits IP address is from a trusted source
|
|
What is a firewall?
|
Security system consisting of hardware and/or software that prevents unauthorized intrusion
|
|
What is a personal firewall utility?
|
Program that protects personal computer and its data from unauthorized intrusions
Monitors transmissions to and from computer Informs you of attempted intrusion |
|
What is a username?
|
Unique combination of characters that identifies user
|
|
What is a password?
|
is private combination of characters associated with the user name that allows access to computer resources
|
|
What is a biometric device?
|
Authenticates person’s identity using personal characteristic
Fingerprint, hand geometry, voice, signature, and iris |
|
What is a license agreement?
|
Right to use software
Single-user license agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer |
|
What are some other safeguards against software theft?
|
product activation allows user to input product identification number online or by phone and receive unique installation identification number.
|
|
What is encryption?
|
safeguards against information theft, process of converting plaintext into ciphertext
|
|
What is certificate authority? (CA)
|
authorized person or company that issues and verifies digital certificates..apply for digital certificate from CA
|
|
What is Secure Sockets layers (SSL)?
|
provides encryption of all data that passes between client and internet server
|
|
What is a system failure?
|
prolonged malfunction of computer, can cause loss of hardware, software or data
|
|
What is a backup?
|
duplicate of fild, program or disk
|
|
What is a surge protector?
|
Protects computer and equipment from electrical power disturbances
|