Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
43 Cards in this Set
- Front
- Back
Computer Security Risk
|
Any event or action that could cause a loss of or damage to computer hardware, software, data, inforamtion, or processing abillity.
|
|
Computer Crime
|
Any illegal act involving a computer
|
|
Cybercrime
|
Internet-based illegal acts.
|
|
Hacker
|
Refers to someone who accesses a computer or network illegally.
|
|
Cracker
|
Someone who accesses a computer or network illegally but has the intent of destroying data, stealing info, or other malicious activity.
|
|
Script Kiddie
|
Has the same skills as a cracker but not as technical and does not as much as knowledge.
|
|
Corporate Spies
|
Have excellent computer and networking skills and are hired to break into a specific computer and steal its data and info.
|
|
Cyberextortionist
|
Someone who uses email as a vehicle for extortion
|
|
Malware
|
Programs that act without a user's knowledge and deliberately alter the computer's operatons.
|
|
Trusted Source
|
An organization or person you believe will not send a virus infected file knowingly.
|
|
Botnet
|
A group of compromised computers connected to a network such as the Internet that are used as a part of a network that attacks other networks.
|
|
Zombie
|
A computer whose owner is unaware the computer is being controlled by an outsider
|
|
DoS Attack
|
Denial of Service. An assault whos purpose is to dissrupt computer access on Internet services.
|
|
Back Door
|
A program or set of instructions in a program that allow users to bypass security controls
|
|
Spoofing
|
A technique intruders use to make their network or internet transmission appear legitimate.
|
|
Unauthorized Use
|
The use of a computer or its data for unapproved or possibly illegal activities.
|
|
Unauthorized Access
|
The use of a computer or network without permission.
|
|
CAPTCHA
|
Completely Automatc Public Turning test to tell Computers and Humans Apart. A program that verifies user input that isnt computer generted.
|
|
Possessed Object
|
Any item that you must carry to gani access to a computer
|
|
Biometric Device
|
Authenicates a person's identity by translating a personal characteristic to a digital code
|
|
Digital Forensics
|
The Discovery, collection, and analysis of evience foun on computers and networks.
|
|
Hardware Theft
|
The act of stealing computer equipment
|
|
Hardware Vandalism
|
The act of defacing or destroying equipment
|
|
Software Theft
|
When someone steals software media, intentionally erases programs, illegally copies a program, and more
|
|
License Agreement
|
The right to use software
|
|
Information Theft
|
When someone steals personal or confiedential information.
|
|
Encryption
|
The process of converting readable data into unreadable characters to prevent unauthorized access.
|
|
Decrypt
|
Deciphering something into a readable form
|
|
Encryption Algorithm
|
The set of steps that convert readable plaintext into unreadable ciphertext
|
|
encryption Key
|
programmed formula that the originator of the data uses to encrypt the plaintext and recipient of the data uses to decrypt the ciphertext.
|
|
Plaintext
|
The unencrypted, readable data in the encryption process
|
|
Ciphertext
|
The encrypted data
|
|
Digital Signature
|
An encrypted code that a person, Web site, or organization attaches to an emessage sender
|
|
Digital Certificate
|
A notice taht guarantees user or Web site is legitimate
|
|
Certificate Authority
|
An authorized person or sompany that issues and vertifies digial certificates
|
|
System Failure
|
The prolonged malfunction of a computer
|
|
Surge Protector
|
Uses a special electrical component to provide a stable curent flow
|
|
UPS
|
A device that contains surge protection circuts and one or more used if original is lost, damaged, or destroyed
|
|
Backup
|
Duplicating a file.
|
|
Restore
|
Copying the backed up files
|
|
War driving
|
Attempting to detect wireless networks via their notebook computer or mobile device while driving a vehicle through an area with wifi
|
|
WPA
|
Wi-fi Protected Access. Security standard that improves on older security standards.
|
|
802.11i or WPA2
|
The most recent netwrok security standards.
|