• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/36

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

36 Cards in this Set

  • Front
  • Back
computer crime
any crime accomplished thru use of computer technology
cyber stalking
stalking on a digital domain
identity theft
taking someone's identity
social engineering
deceptive means of getting individuals to reveal sensitive information
spoofing
masquerading as somebody else
phishing
internet fraud technique
malware
malicious software
viruses
replicate themselves into uninfected programs
worms
reproduces until the comp freezes spreads through network
Trojan horse
appear inocuous but are really carrying out harmful things
time bot-go off at certain time
logic - go off with an event
spyware
collect info without user permission
spybot
communicate info via the internet
antivirus software
searches for viruses
security patches
plug potentional security breaches
protecting against identity theft
make online purchased using credit or PayPal
don't share info over the phone
keep wallet thin
handle email with care
scan bills promptly
hackers
people that break into your computer systems
cracking
criminal hacking
hactivists
political activism
botnets
work of computers that have been hijacked
dos
attacks bombard servers and websites crash
passwords
most common use to restrict access to computers
access control software
don't need to treat all users identically
system administrator
has additional access privelages
firewalls
guard against unauthorized access to an internal network
encryption software
scrambles transmissions to ensure them in transit
tempest
program.used to secure electronic communications while enabling the us government to do stuff
audit control software
use to moniter and record transactions so auditors can trace activity
safe computing
share with care
disinfect regularly
beware of emails with gifts
take.ur passwords seriously
software engineering facts
its impossible to remove all bugs
programs that even seen to work can have bugs
the bigger the system the bigger the problem
smart weapons
weapons that use computerized guidance systems to locate their targets
backups
protect data from.being lost// shield electronic equipment from.power spikes
backups and other precautions
incremental
bootable - completely copies disk
off site transports DVDs ofndata to remove site
archive data is transported and deleted from.main drive
bugs
can't get em all
the bkgfer the system more bugs
even inocuous can be dangerous
autonomous system
can perform tasks without human input
surge protector
protects from power spikes
biometrics
used to identify an individual before giving them access to your computer