• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/70

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

70 Cards in this Set

  • Front
  • Back
Computer Security Risk
Any event or action that could cause a loss or damage to computer hardware, software, data, information, or processing capability.
Computer Crime
Any illegal act involving a computer.
Cybercrime
Online or Internet based illegal acts.
Hacker
Refers to someone who accesses a computer or network illegally.
Cracker
Someone who accesses a computer or network illegally but has intent to destroy data, steal, information, or other malicious actions.
Script Kiddie
Same intent as a cracker, but lacks the technical skills and knowledge, and often use prewritten programs to access computers.
Corporate Spies
Hired to break into a specific computer and steal its data and information.
Cyberextortionist
Someone who uses e-mail as a vehicle for extortion.
Malware
Programs that act without a user's knowledge and deliberately alter the computer's operations.
Virus
Potentially damaging program that negatively affects a computer, spreads throughout the computer.
Worm
Copies itself repeatedly using up resources.
Trojan Horse
Hides within or looks like a legitimate program, a certain condition or action triggers it.
Rootkit
Program that hides in a computer and allows someone from a remote location to take full control of the computer.
Payload
The event the program is intended to deliver.
Trusted Source
Organization or person you believe will not send a virus infected file to you knowingly.
Botnet
Group of compromised computers connected to a network that are used as part of a network that attacks other networks.
Zombie
Owner is unaware that the computer is being controlled by an outside user.
DoS Attack
(Denial of Service Attack) Disrupt a computers access to an Internet service such as the Web or e-mail.
Back Door
Program or set of instructions in a program that allows users to bypass security controls when accessing a computer.
Spoofing
Technique intruders use to make their transmission look legitimate.
Unauthorized Use
Use of a computer or its data for unapproved or possibly illegal activities.
Unauthorized Access
Use of a computer or network without permission.
CAPTCHA
(completely automated public turing test to tell computers and humans apart) Verifies user input.
Possessed Object
Any item you must carry to gain access to a computer or computer facility.
Biometric Device
Authenticates a person's identity by translating a personal characteristic into a digital code compared with a stored one.
Digital Forensics
(computer forensics) Discovery, collection, and analysis of evidence found on computers and networks.
Hardware Theft
Act of stealing computer equipment.
Hardware Vandalism
Act of defacing or destroying computer equipment.
Software Theft
When someone steals software media, intentionally erases programs, illegally copies them, or illegally registers or activates a program.
License Agreement
The right to use the software.
Information Theft
Occurs when someone steals personal or confidential information.
Encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
Decryption
(decipher) Converting encrypted data into readable form.
Encryption Algorithm
Set of steps that can convert readable plaintext into unreadable ciphertext.
Encryption Key
Programmed formula that the originator of the data uses to encrypt plaintext and the recipient to decrypt the ciphertext.
Plaintext
Unencrypted, readable data
Ciphertext
Encrypted data
Digital Signature
Encrypted code that a person, Web site, or organization attaches to an electronic message sender.
Digital Certificate
Is a notice that guarentees a user or a Web site is legitimate.
Certificate Authority
Authorized person or company that issues and verifies digital certificates.
System Failure
Prolonged malfunctions of a computer.
Surge Protector
Special electronic components that provide a stable current flow to the computer and other electronic equipment.
UPS
(Uninterruptible power supply) Device that contains surge protection circuits and one or more batteries that can provide power during a loss of power.
Backup
Deplicate file, program, or disk that can be used if the original is lost, damaged, or stolen.
Restore
Copying the backed up files to their original location on the computer.
WAP
(wireless access point) Connection to a wireless network.
War driving
Individuals attempt to detect wireless networks via their notebook or mobile device while driving a vehicle through areas that might have a wireless network.
WPA
(Wi-Fi Protected Access) Security standard that improves on older security standards by authenticating network users.
802.11i or WPA2
Conforms to the government's security standards and uses more sophisticated encryption techniques than WPA.
RSI
(Repetitive Strain Injury) Injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
CVS
(computer vision syndrome) Type of health-related condition due to computer usage.
Ergonomics
Applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workspace.
Computer Addiction
Occurs when the computer consumes someone's entire social life.
Computer Ethics
Moral guidelines that govern the use of computers and informaiton systems.
National Press Photographers
A group that completely opposes any manipulation of an image.
Intellectual Property Rights
Rights to which creators are entitled for their work.
Copyright
Gives the authors and artists exclusive rights to duplicate, publish, and sell their materials.
Green computing
Involves reducing the electricity and enviromental waste while using a computer.
Energy Star Program
U.S. government developed program to reduce the amount of electricity used by computers and related devices.
Information Privacy
Right of individuals and companies to deny or restrict the collection and use of information about them.
Electronic Profile
Combination of data that firms put together of an individual.
Cookie
Small text file that a Web server stores on your computer.
Spyware
Program placed on a computer without the user's knowledge that secretly collects information about the user.
Adware
Program that displays an online advertisement in a banner or pop-up window on Web-pages, e-mail messages, or other Internet services.
Spam
Unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once.
Phishing
Scam when a perpetrator sends an official looking e-mail that attempts to obtain your personal financial information.
Pharming
Similar to phishing, except via spoofing.
Social Engineering
Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
Employee Monitoring
Use of computers to observe, record, and review an employee
s use of a computer including communications, e-mail, keyboard activity and visited Web sites.
Content Filtering
Process of restricting access to certain material on the Web.