• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/64

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

64 Cards in this Set

  • Front
  • Back
event / action that can cause damage to hardware, software, data, information, and processing ability
computer security risk
illegal act involving a computer
computer crime
online / internet based illegal acts
cybercrime
someone who accesses computer networks illegally
hacker
a hacker that tends to destroy data, steal info, or other malicious actions
cracker
cracker without technological skills or knowledge
script kiddie
hired to break into a specific computer and steal data / information
corporate spies
someone using email as a vehicle for extortion
cyberextortionist
deliberately alters computer functions and capabilities
malware
organization or person you do not think will send you malware
a trusted source
compromised computers connected to a network that attacks other networks
botnet
compromised computer
zombie
cannot get on internet or email
DoS (denial of service) attack
program that allows users to bypass security controls when accessing a program
a backdoor
technique used to make an infected network appear legitimate
spoofing
use of computer /data for unapproved or illegal activities
unauthorized use
use of a computer network without permission
unauthorized access
verifies users input is not computer generated
CAPTCHA (completely automated public touring test to tell computers and humans apart)
item you must carry to gain access to a computer or a network
a possessed object
authenticates a persons identity
biometric device
discovery, collection, and analysis of evidence found on a computer or network
digital forensics
act of stealing computer equipment
hardware theft
act of defacing / destroying computer equipment
hardware vandalism
someone who steals software media, destroys programs, steals programs, and illegally registers programs
software theft
right to use software
license agreement
steals personal / confidential information
information theft
converting readable data to unreadable characters
encryption
decipher
decrypt
converts plaintext to unreadable ciphertext
encryption algorithm
program formula to encrypt plaintext
encryption key
uncrypted readable data
plaintext
encrypted scrambled data
ciphertext
encrypted code to identify people on the internet
digital signature
note that guarantees legitimate site
digital certificate
authorizes person or company a digital certificate
certificate authority
prolonged malfunction of a computer
system failure
provides stable current flow to a computer
surge protector
contains surge protection circuits and provides power in a power loss
UPS (uninterpretable power supply)
copied file
a backup
copying backed up files back to place
restore
wireless access point
WAP
individuals attempting to detect wireless networks
war driving
improves older security standards
WPA (wifi-protected access)
recent network security standard
802.11i or WPA2
injury or disorder of muscles, nerves, tendons, ligaments, and joints. Caused by repetitive use
RSI (repetitive strain injury)
sore, tired, burning, itching, or dry eyes
CVS (computer vision syndrome)
applied science devoted to incorporating comfort into the workplace
ergonomics
where a computer consumes someones entire social life
computer addiction
moral guidelines that govern the use of computers and information systems
computer ethics
believe slightest alteration could lead to misrepresentative photos
national press photographers
rights which creators entitle their work
intellectual property rights
gives exclusive rights to use materials
copyright
reducing electricity / environmental waste while using a computer
green computing
reduces the amount of electricity used by a computer
energy star program
rights of individuals and companies to deny or restrict collection and use of information on them
information privacy
representative profile on the internet
electronic profile
a small text file that a web browser stores on your computer
cookie
secretly collects information about a user
spyware
displays online ads
adware
unsolicited email message or newsgroup posting sent to multiple people all at once
spam
phishing done via spoofing
pharming
takes advantage of human nature for information
social engineering
involves use of computers to observe employees use of a computer
employee monitoring
restricting certain materials on the web
content filtering