Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
36 Cards in this Set
- Front
- Back
computer crime
|
any crime accomplished thru use of computer technology
|
|
cyber stalking
|
stalking on a digital domain
|
|
identity theft
|
taking someone's identity
|
|
social engineering
|
deceptive means of getting individuals to reveal sensitive information
|
|
spoofing
|
masquerading as somebody else
|
|
phishing
|
internet fraud technique
|
|
malware
|
malicious software
|
|
viruses
|
replicate themselves into uninfected programs
|
|
worms
|
reproduces until the comp freezes spreads through network
|
|
Trojan horse
|
appear inocuous but are really carrying out harmful things
time bot-go off at certain time logic - go off with an event |
|
spyware
|
collect info without user permission
|
|
spybot
|
communicate info via the internet
|
|
antivirus software
|
searches for viruses
|
|
security patches
|
plug potentional security breaches
|
|
protecting against identity theft
|
make online purchased using credit or PayPal
don't share info over the phone keep wallet thin handle email with care scan bills promptly |
|
hackers
|
people that break into your computer systems
|
|
cracking
|
criminal hacking
|
|
hactivists
|
political activism
|
|
botnets
|
work of computers that have been hijacked
|
|
dos
|
attacks bombard servers and websites crash
|
|
passwords
|
most common use to restrict access to computers
|
|
access control software
|
don't need to treat all users identically
|
|
system administrator
|
has additional access privelages
|
|
firewalls
|
guard against unauthorized access to an internal network
|
|
encryption software
|
scrambles transmissions to ensure them in transit
|
|
tempest
|
program.used to secure electronic communications while enabling the us government to do stuff
|
|
audit control software
|
use to moniter and record transactions so auditors can trace activity
|
|
safe computing
|
share with care
disinfect regularly beware of emails with gifts take.ur passwords seriously |
|
software engineering facts
|
its impossible to remove all bugs
programs that even seen to work can have bugs the bigger the system the bigger the problem |
|
smart weapons
|
weapons that use computerized guidance systems to locate their targets
|
|
backups
|
protect data from.being lost// shield electronic equipment from.power spikes
|
|
backups and other precautions
|
incremental
bootable - completely copies disk off site transports DVDs ofndata to remove site archive data is transported and deleted from.main drive |
|
bugs
|
can't get em all
the bkgfer the system more bugs even inocuous can be dangerous |
|
autonomous system
|
can perform tasks without human input
|
|
surge protector
|
protects from power spikes
|
|
biometrics
|
used to identify an individual before giving them access to your computer
|