Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
66 Cards in this Set
- Front
- Back
Computer Security Risk
|
Is any event or action that could cause a loss, damage, and misuse.
|
|
Computer Crime
|
Any illegal act involving a computer.
|
|
Cybercrime
|
Is online or Internet-based illegal acts.
|
|
Hacker
|
Is someone who access a computer or network illegally.
|
|
Cracker
|
Is someone who accesses a computer illegally but has the intent of destroying data, stealing info, or other actions.
|
|
Script Kiddie
|
Same intent as a cracker but does not have the technical skills and knowledge.
|
|
Corporate Spies
|
They are hired to break into a specific computer and steal its proprietary data and info.
|
|
Cyberextortionist
|
Someone who uses e-mail as a vehicle for extortion.
|
|
Malware
|
Programs that act without a user's knowledge and deliberately alter the computer's operations.
|
|
Payload
|
Destructive event or prank, the program is intended to deliver.
|
|
Trusted Source
|
An organization or person you believe will not send a virus infected file knowingly.
|
|
Botnet
|
A group of compromised computers connected to a network and attacks other networks, usually for nefarious purposes.
|
|
Zombie
|
Compromised computer. Is one whose owner is unaware the computer is being controlled remotely by an outsider.
|
|
DoS Attack
|
Denial of service attack. It is an assault whose purpose is to disrupt computer access to an Internet service.
|
|
Back door
|
Is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network.
|
|
Spoofing
|
A technique intruders use to make their network or Internet transmission appear legitimate to a victim.
|
|
Unauthorized Use
|
The use of a computer or its data for unapproved or possibly illegal activities.
|
|
Unauthorized Access
|
Is the use of a computer or network without permission.
|
|
CAPTCHA
|
Completely Automated Public Turing Test To Tell Computers and Humans Apart.
|
|
Possessed object
|
Any item that you must carry to gain access to a computer or computer facility.
|
|
Biometric Device
|
Authenticates a person's identity by translating a personal characteristic.
|
|
Digital Forensics
|
Network forensics, or cyber forensics, is the discovery, collection, and analysis of evidence found on computers and networks.
|
|
RSI
|
Repetitive strain injury. An injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
|
|
CVS
|
Computer vision syndrome. Is a condition due to computer usage, from staring at a computer to long.
|
|
Ergonomics
|
An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
|
|
Computer addiction
|
Occurs when the computer consumes someone's entire social life.
|
|
Computer Ethics
|
Are the moral guild lines that govern the use of computers and information systems.
|
|
National Press Photographers
|
They oppose any manipulation often images.
|
|
Intellectual Property Rights
|
Are the rights to which creators are entitled for their work.
|
|
Copyright
|
Gives authors and artists exclusive rights to duplicate, publish, and sell their materials.
|
|
Green computing
|
Involves reducing the electricity and environmental waste while using a computer
|
|
Energy Star Program
|
to help reduce the amount of electricity used by computers and related devices. Government mandated
|
|
Information privacy
|
Is the right of individuals and companies to deny or restrict the collection and use of info about them.
|
|
Electronic Profile
|
Your personal info you put into the computer for subscriptions that go into your database and all your info is then your profile.
|
|
Cookie
|
Is a small text file that a Web-server stores on your computer. Contains user names and passwords
|
|
Spyware
|
Is a program placed on a computer without the user's knowledge that secretly collects info about the user.
|
|
Adware
|
Is a program that displays an online advertisement in a banner or pop-up window.
|
|
Spam
|
An unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once.
|
|
Phishing
|
Is a scam in which a perpetrator sends official looking e-mail message that attempts to obtain your personal and financial info. via e-mail
|
|
Pharming
|
Is a scam, where a perpetrator attempts to obtain your personal and financial info. via spoofing
|
|
Social Engineering
|
Gaining unauthorized access or obtaining confidential info by taking advantage of the trusting human nature of some victims and the naivety of others
|
|
Employee Monitoring
|
Involves the use of computers to observe, record, and review an employee's use of a computer, including communications, keyboard activity, and web-sites visited.
|
|
Content filtering
|
The process of restricting access to certain material on the web.
|
|
Hardware theft
|
Is the act of stealing computer equipment.
|
|
Hardware vandalism
|
Is the act of defacing or destroying computer equipment.
|
|
encryption key
|
Is a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
|
|
plaintext
|
Text that you can read.
|
|
ciphertext
|
Text that is all mixed up and is unreadable.
|
|
Digital signature
|
Is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender.
|
|
Digital certificate
|
Is a notice that guarantees a user or a Web site is legitimate.
|
|
Certificate authority
|
Is an authorized or a company that issues and verifies digital certificates.
|
|
System failure
|
is the prolonged malfunction of a computer. Loss of hardware, software, data, and instructions.
|
|
Software theft
|
Occurs when someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers and/or activates a program.
|
|
License agreement
|
Is the right to use the software.
|
|
Information theft
|
Occurs when someone steals personal or confidential information.
|
|
Encryption
|
The process of converting readable data into unreadable characters to prevent unauthorized access.
|
|
Decrypt
|
Or decipher, it into a readable form.
|
|
Encryption algorithm
|
Set of steps that can convert readable plaintext into unreadable ciphertext.
|
|
Surge protector
|
Uses special electrical components to provide a stable current flow to the computer and other electronic equipment.
|
|
UPS
|
Uninterruptible power supply. Is a device that contains surge protection circuits and one or more batteries that can provide power during a loss of power.
|
|
Backup
|
A duplicate file, program, or disk that can be used if the original is lost, damaged, or destroyed.
|
|
Restore
|
You copy the backed up files to their original location on the computer.
|
|
WAP
|
Wireless access point. Should be configured so that it does not broadcast a network name.
|
|
War driving
|
Individuals attempt to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network.
|
|
WPA
|
Wi-Fi Protected Access. Is a security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques.
|
|
802.lli or WPA2
|
The most recent network security standard, conforms to the government's security standards and uses more sophisticated encryption techniques than WPA.
|