Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
70 Cards in this Set
- Front
- Back
Computer Security Risk
|
Any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability.
|
|
Computer Crime
|
Any illegal act involving a computer.
|
|
Cybercrime
|
Online or Internet based illegal acts.
|
|
Hacker
|
Refers to someone who accesses a computer or network illegally.
|
|
Cracker
|
Someone who accesses a computer or network illegally but has intent to destroy data, steal, information, or other malicious actions.
|
|
Script Kiddie
|
Same intent as a cracker, but lacks the technical skills and knowledge, and often use prewritten programs to access computers.
|
|
Corporate Spies
|
Hired to break into a specific computer and steal its data and information.
|
|
Cyberextortionist
|
Someone who uses e-mail as a vehicle for extortion.
|
|
Malware
|
Programs that act without a user's knowledge and deliberately alter the computer's operations.
|
|
Virus
|
Potentially damaging program that negatively affects a computer, spreads throughout the computer.
|
|
Worm
|
Copies itself repeatedly using up resources.
|
|
Trojan Horse
|
Hides within or looks like a legitimate program, a certain condition or action triggers it.
|
|
Rootkit
|
Program that hides in a computer and allows someone from a remote location to take full control of the computer.
|
|
Payload
|
The event the program is intended to deliver.
|
|
Trusted Source
|
Organization or person you believe will not send a virus infected file to you knowingly.
|
|
Botnet
|
Group of compromised computers connected to a network that are used as part of a network that attacks other networks.
|
|
Zombie
|
Owner is unaware that the computer is being controlled by an outside user.
|
|
DoS Attack
|
(Denial of Service Attack) Disrupt a computers access to an Internet service such as the Web or e-mail.
|
|
Back Door
|
Program or set of instructions in a program that allows users to bypass security controls when accessing a computer.
|
|
Spoofing
|
Technique intruders use to make their transmission look legitimate.
|
|
Unauthorized Use
|
Use of a computer or its data for unapproved or possibly illegal activities.
|
|
Unauthorized Access
|
Use of a computer or network without permission.
|
|
CAPTCHA
|
(completely automated public turing test to tell computers and humans apart) Verifies user input.
|
|
Possessed Object
|
Any item you must carry to gain access to a computer or computer facility.
|
|
Biometric Device
|
Authenticates a person's identity by translating a personal characteristic into a digital code compared with a stored one.
|
|
Digital Forensics
|
(computer forensics) Discovery, collection, and analysis of evidence found on computers and networks.
|
|
Hardware Theft
|
Act of stealing computer equipment.
|
|
Hardware Vandalism
|
Act of defacing or destroying computer equipment.
|
|
Software Theft
|
When someone steals software media, intentionally erases programs, illegally copies them, or illegally registers or activates a program.
|
|
License Agreement
|
The right to use the software.
|
|
Information Theft
|
Occurs when someone steals personal or confidential information.
|
|
Encryption
|
Process of converting readable data into unreadable characters to prevent unauthorized access.
|
|
Decryption
|
(decipher) Converting encrypted data into readable form.
|
|
Encryption Algorithm
|
Set of steps that can convert readable plaintext into unreadable ciphertext.
|
|
Encryption Key
|
Programmed formula that the originator of the data uses to encrypt plaintext and the recipient to decrypt the ciphertext.
|
|
Plaintext
|
Unencrypted, readable data
|
|
Ciphertext
|
Encrypted data
|
|
Digital Signature
|
Encrypted code that a person, Web site, or organization attaches to an electronic message sender.
|
|
Digital Certificate
|
Is a notice that guarentees a user or a Web site is legitimate.
|
|
Certificate Authority
|
Authorized person or company that issues and verifies digital certificates.
|
|
System Failure
|
Prolonged malfunctions of a computer.
|
|
Surge Protector
|
Special electronic components that provide a stable current flow to the computer and other electronic equipment.
|
|
UPS
|
(Uninterruptible power supply) Device that contains surge protection circuits and one or more batteries that can provide power during a loss of power.
|
|
Backup
|
Deplicate file, program, or disk that can be used if the original is lost, damaged, or stolen.
|
|
Restore
|
Copying the backed up files to their original location on the computer.
|
|
WAP
|
(wireless access point) Connection to a wireless network.
|
|
War driving
|
Individuals attempt to detect wireless networks via their notebook or mobile device while driving a vehicle through areas that might have a wireless network.
|
|
WPA
|
(Wi-Fi Protected Access) Security standard that improves on older security standards by authenticating network users.
|
|
802.11i or WPA2
|
Conforms to the government's security standards and uses more sophisticated encryption techniques than WPA.
|
|
RSI
|
(Repetitive Strain Injury) Injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
|
|
CVS
|
(computer vision syndrome) Type of health-related condition due to computer usage.
|
|
Ergonomics
|
Applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workspace.
|
|
Computer Addiction
|
Occurs when the computer consumes someone's entire social life.
|
|
Computer Ethics
|
Moral guidelines that govern the use of computers and informaiton systems.
|
|
National Press Photographers
|
A group that completely opposes any manipulation of an image.
|
|
Intellectual Property Rights
|
Rights to which creators are entitled for their work.
|
|
Copyright
|
Gives the authors and artists exclusive rights to duplicate, publish, and sell their materials.
|
|
Green computing
|
Involves reducing the electricity and enviromental waste while using a computer.
|
|
Energy Star Program
|
U.S. government developed program to reduce the amount of electricity used by computers and related devices.
|
|
Information Privacy
|
Right of individuals and companies to deny or restrict the collection and use of information about them.
|
|
Electronic Profile
|
Combination of data that firms put together of an individual.
|
|
Cookie
|
Small text file that a Web server stores on your computer.
|
|
Spyware
|
Program placed on a computer without the user's knowledge that secretly collects information about the user.
|
|
Adware
|
Program that displays an online advertisement in a banner or pop-up window on Web-pages, e-mail messages, or other Internet services.
|
|
Spam
|
Unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once.
|
|
Phishing
|
Scam when a perpetrator sends an official looking e-mail that attempts to obtain your personal financial information.
|
|
Pharming
|
Similar to phishing, except via spoofing.
|
|
Social Engineering
|
Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
|
|
Employee Monitoring
|
Use of computers to observe, record, and review an employee
s use of a computer including communications, e-mail, keyboard activity and visited Web sites. |
|
Content Filtering
|
Process of restricting access to certain material on the Web.
|