Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
22 Cards in this Set
- Front
- Back
Computer Security Risk
|
any event or action that could cause a loss of or damage to the computer hardware, software, data information, or the processor
|
|
Computer Crime
|
any illegal act involving a computer
|
|
Cyber crime
|
online or internet based acts
|
|
Hacker
|
someone who accesses a computer or network illegally
|
|
Cracker
|
someone who accesses a computer or network illegally but has the intention of destroying data
|
|
Script Kiddie
|
same intent as a cracker but not as much skill
|
|
Corporate spies
|
people hired to break into a specific computer and steal its proprietary data and info
|
|
Cyberextortionist
|
someone who uses e-mail as a vehicle for extortion
|
|
Malware (malicious software)
|
programs that act without a users knowledge and deliberately alters the computers operations
|
|
Payload
|
destructive event or prank the program is intended to deliver
|
|
Trusted Source
|
an organization or person you believe will not send you a virus intentionally
|
|
Botnet
|
group of compromised computers connected to a network such as the internet to attack other services
|
|
Zombie
|
one whose owner is unaware the computer is being controlled by an outsider
|
|
DoS Attack
|
an assault whose purpose is to disrupt computer access to and internet service
|
|
Back door
|
a program or set of instructions in a program that allow users to bypass security controls
|
|
Spoofing
|
a technique intruders use to make their network or internet transmission appear real
|
|
Unauthorized use
|
use of a computer or its data for unapproved activity
|
|
Unauthorized Access
|
use of a computer or network without permission
|
|
CAPTCHA (Completely Automated Public turing Test to tell Humans and Computers Apart)
|
a program that verifies users input is not computer generated
|
|
Possesed object
|
any item that you must carry to gain access to a computer
|
|
Biometric device
|
authenticates a persons identity by translating a personal characteristic
|
|
Digital Forensics
|
the discovery,collection,and analysis found on computers and networks
|