Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/24

Click to flip

24 Cards in this Set

  • Front
  • Back
What is a computer security risk?
Action that causes loss of or damage to computer system
How can you make your password more secure?
longer passwords provide greater security
What is a virus?
is a potentially damaging computer program
What is a worm?
itself repeatedly, using up resources and possibly shutting down computer or network
What is a trojan horse?
hides within or looks like legitimate program until triggered
What is an antivirus program?
Identifies and removes computer viruses
Most also protect against worms and Trojan horses
What is a virus signature?
Specific pattern of virus code
Also called virus definition

Antivirus programs look for virus signatures
What is a denial service attack?
is an assault which disrupts computer access to an Internet service such as the Web or e-mail
What is a back door?
is a program or set of instructions in a program that allow users to bypass security controls when accessing a computer resource
What is a possessed oject?
item that you must carry to gain access to computer or facility.
What is spoofing?
IP spoofing occurs when an intruder computer fools a network into believing its IP address is from a trusted source
What is a firewall?
Security system consisting of hardware and/or software that prevents unauthorized intrusion
What is a personal firewall utility?
Program that protects personal computer and its data from unauthorized intrusions
Monitors transmissions to and from computer
Informs you of attempted intrusion
What is a username?
Unique combination of characters that identifies user
What is a password?
is private combination of characters associated with the user name that allows access to computer resources
What is a biometric device?
Authenticates person’s identity using personal characteristic
Fingerprint, hand geometry, voice, signature, and iris
What is a license agreement?
Right to use software
Single-user license agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer
What are some other safeguards against software theft?
product activation allows user to input product identification number online or by phone and receive unique installation identification number.
What is encryption?
safeguards against information theft, process of converting plaintext into ciphertext
What is certificate authority? (CA)
authorized person or company that issues and verifies digital certificates..apply for digital certificate from CA
What is Secure Sockets layers (SSL)?
provides encryption of all data that passes between client and internet server
What is a system failure?
prolonged malfunction of computer, can cause loss of hardware, software or data
What is a backup?
duplicate of fild, program or disk
What is a surge protector?
Protects computer and equipment from electrical power disturbances