Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
64 Cards in this Set
- Front
- Back
event / action that can cause damage to hardware, software, data, information, and processing ability
|
computer security risk
|
|
illegal act involving a computer
|
computer crime
|
|
online / internet based illegal acts
|
cybercrime
|
|
someone who accesses computer networks illegally
|
hacker
|
|
a hacker that tends to destroy data, steal info, or other malicious actions
|
cracker
|
|
cracker without technological skills or knowledge
|
script kiddie
|
|
hired to break into a specific computer and steal data / information
|
corporate spies
|
|
someone using email as a vehicle for extortion
|
cyberextortionist
|
|
deliberately alters computer functions and capabilities
|
malware
|
|
organization or person you do not think will send you malware
|
a trusted source
|
|
compromised computers connected to a network that attacks other networks
|
botnet
|
|
compromised computer
|
zombie
|
|
cannot get on internet or email
|
DoS (denial of service) attack
|
|
program that allows users to bypass security controls when accessing a program
|
a backdoor
|
|
technique used to make an infected network appear legitimate
|
spoofing
|
|
use of computer /data for unapproved or illegal activities
|
unauthorized use
|
|
use of a computer network without permission
|
unauthorized access
|
|
verifies users input is not computer generated
|
CAPTCHA (completely automated public touring test to tell computers and humans apart)
|
|
item you must carry to gain access to a computer or a network
|
a possessed object
|
|
authenticates a persons identity
|
biometric device
|
|
discovery, collection, and analysis of evidence found on a computer or network
|
digital forensics
|
|
act of stealing computer equipment
|
hardware theft
|
|
act of defacing / destroying computer equipment
|
hardware vandalism
|
|
someone who steals software media, destroys programs, steals programs, and illegally registers programs
|
software theft
|
|
right to use software
|
license agreement
|
|
steals personal / confidential information
|
information theft
|
|
converting readable data to unreadable characters
|
encryption
|
|
decipher
|
decrypt
|
|
converts plaintext to unreadable ciphertext
|
encryption algorithm
|
|
program formula to encrypt plaintext
|
encryption key
|
|
uncrypted readable data
|
plaintext
|
|
encrypted scrambled data
|
ciphertext
|
|
encrypted code to identify people on the internet
|
digital signature
|
|
note that guarantees legitimate site
|
digital certificate
|
|
authorizes person or company a digital certificate
|
certificate authority
|
|
prolonged malfunction of a computer
|
system failure
|
|
provides stable current flow to a computer
|
surge protector
|
|
contains surge protection circuits and provides power in a power loss
|
UPS (uninterpretable power supply)
|
|
copied file
|
a backup
|
|
copying backed up files back to place
|
restore
|
|
wireless access point
|
WAP
|
|
individuals attempting to detect wireless networks
|
war driving
|
|
improves older security standards
|
WPA (wifi-protected access)
|
|
recent network security standard
|
802.11i or WPA2
|
|
injury or disorder of muscles, nerves, tendons, ligaments, and joints. Caused by repetitive use
|
RSI (repetitive strain injury)
|
|
sore, tired, burning, itching, or dry eyes
|
CVS (computer vision syndrome)
|
|
applied science devoted to incorporating comfort into the workplace
|
ergonomics
|
|
where a computer consumes someones entire social life
|
computer addiction
|
|
moral guidelines that govern the use of computers and information systems
|
computer ethics
|
|
believe slightest alteration could lead to misrepresentative photos
|
national press photographers
|
|
rights which creators entitle their work
|
intellectual property rights
|
|
gives exclusive rights to use materials
|
copyright
|
|
reducing electricity / environmental waste while using a computer
|
green computing
|
|
reduces the amount of electricity used by a computer
|
energy star program
|
|
rights of individuals and companies to deny or restrict collection and use of information on them
|
information privacy
|
|
representative profile on the internet
|
electronic profile
|
|
a small text file that a web browser stores on your computer
|
cookie
|
|
secretly collects information about a user
|
spyware
|
|
displays online ads
|
adware
|
|
unsolicited email message or newsgroup posting sent to multiple people all at once
|
spam
|
|
phishing done via spoofing
|
pharming
|
|
takes advantage of human nature for information
|
social engineering
|
|
involves use of computers to observe employees use of a computer
|
employee monitoring
|
|
restricting certain materials on the web
|
content filtering
|