• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/43

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

43 Cards in this Set

  • Front
  • Back
Computer Security Risk
Any event or action that could cause a loss of or damage to computer hardware, software, data, inforamtion, or processing abillity.
Computer Crime
Any illegal act involving a computer
Cybercrime
Internet-based illegal acts.
Hacker
Refers to someone who accesses a computer or network illegally.
Cracker
Someone who accesses a computer or network illegally but has the intent of destroying data, stealing info, or other malicious activity.
Script Kiddie
Has the same skills as a cracker but not as technical and does not as much as knowledge.
Corporate Spies
Have excellent computer and networking skills and are hired to break into a specific computer and steal its data and info.
Cyberextortionist
Someone who uses email as a vehicle for extortion
Malware
Programs that act without a user's knowledge and deliberately alter the computer's operatons.
Trusted Source
An organization or person you believe will not send a virus infected file knowingly.
Botnet
A group of compromised computers connected to a network such as the Internet that are used as a part of a network that attacks other networks.
Zombie
A computer whose owner is unaware the computer is being controlled by an outsider
DoS Attack
Denial of Service. An assault whos purpose is to dissrupt computer access on Internet services.
Back Door
A program or set of instructions in a program that allow users to bypass security controls
Spoofing
A technique intruders use to make their network or internet transmission appear legitimate.
Unauthorized Use
The use of a computer or its data for unapproved or possibly illegal activities.
Unauthorized Access
The use of a computer or network without permission.
CAPTCHA
Completely Automatc Public Turning test to tell Computers and Humans Apart. A program that verifies user input that isnt computer generted.
Possessed Object
Any item that you must carry to gani access to a computer
Biometric Device
Authenicates a person's identity by translating a personal characteristic to a digital code
Digital Forensics
The Discovery, collection, and analysis of evience foun on computers and networks.
Hardware Theft
The act of stealing computer equipment
Hardware Vandalism
The act of defacing or destroying equipment
Software Theft
When someone steals software media, intentionally erases programs, illegally copies a program, and more
License Agreement
The right to use software
Information Theft
When someone steals personal or confiedential information.
Encryption
The process of converting readable data into unreadable characters to prevent unauthorized access.
Decrypt
Deciphering something into a readable form
Encryption Algorithm
The set of steps that convert readable plaintext into unreadable ciphertext
encryption Key
programmed formula that the originator of the data uses to encrypt the plaintext and recipient of the data uses to decrypt the ciphertext.
Plaintext
The unencrypted, readable data in the encryption process
Ciphertext
The encrypted data
Digital Signature
An encrypted code that a person, Web site, or organization attaches to an emessage sender
Digital Certificate
A notice taht guarantees user or Web site is legitimate
Certificate Authority
An authorized person or sompany that issues and vertifies digial certificates
System Failure
The prolonged malfunction of a computer
Surge Protector
Uses a special electrical component to provide a stable curent flow
UPS
A device that contains surge protection circuts and one or more used if original is lost, damaged, or destroyed
Backup
Duplicating a file.
Restore
Copying the backed up files
War driving
Attempting to detect wireless networks via their notebook computer or mobile device while driving a vehicle through an area with wifi
WPA
Wi-fi Protected Access. Security standard that improves on older security standards.
802.11i or WPA2
The most recent netwrok security standards.