• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back
Computer Security Risk
any event or action that could cause a loss of or damage to the computer hardware, software, data information, or the processor
Computer Crime
any illegal act involving a computer
Cyber crime
online or internet based acts
Hacker
someone who accesses a computer or network illegally
Cracker
someone who accesses a computer or network illegally but has the intention of destroying data
Script Kiddie
same intent as a cracker but not as much skill
Corporate spies
people hired to break into a specific computer and steal its proprietary data and info
Cyberextortionist
someone who uses e-mail as a vehicle for extortion
Malware (malicious software)
programs that act without a users knowledge and deliberately alters the computers operations
Payload
destructive event or prank the program is intended to deliver
Trusted Source
an organization or person you believe will not send you a virus intentionally
Botnet
group of compromised computers connected to a network such as the internet to attack other services
Zombie
one whose owner is unaware the computer is being controlled by an outsider
DoS Attack
an assault whose purpose is to disrupt computer access to and internet service
Back door
a program or set of instructions in a program that allow users to bypass security controls
Spoofing
a technique intruders use to make their network or internet transmission appear real
Unauthorized use
use of a computer or its data for unapproved activity
Unauthorized Access
use of a computer or network without permission
CAPTCHA (Completely Automated Public turing Test to tell Humans and Computers Apart)
a program that verifies users input is not computer generated
Possesed object
any item that you must carry to gain access to a computer
Biometric device
authenticates a persons identity by translating a personal characteristic
Digital Forensics
the discovery,collection,and analysis found on computers and networks