• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/66

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

66 Cards in this Set

  • Front
  • Back
Computer Security Risk
Is any event or action that could cause a loss, damage, and misuse.
Computer Crime
Any illegal act involving a computer.
Cybercrime
Is online or Internet-based illegal acts.
Hacker
Is someone who access a computer or network illegally.
Cracker
Is someone who accesses a computer illegally but has the intent of destroying data, stealing info, or other actions.
Script Kiddie
Same intent as a cracker but does not have the technical skills and knowledge.
Corporate Spies
They are hired to break into a specific computer and steal its proprietary data and info.
Cyberextortionist
Someone who uses e-mail as a vehicle for extortion.
Malware
Programs that act without a user's knowledge and deliberately alter the computer's operations.
Payload
Destructive event or prank, the program is intended to deliver.
Trusted Source
An organization or person you believe will not send a virus infected file knowingly.
Botnet
A group of compromised computers connected to a network and attacks other networks, usually for nefarious purposes.
Zombie
Compromised computer. Is one whose owner is unaware the computer is being controlled remotely by an outsider.
DoS Attack
Denial of service attack. It is an assault whose purpose is to disrupt computer access to an Internet service.
Back door
Is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network.
Spoofing
A technique intruders use to make their network or Internet transmission appear legitimate to a victim.
Unauthorized Use
The use of a computer or its data for unapproved or possibly illegal activities.
Unauthorized Access
Is the use of a computer or network without permission.
CAPTCHA
Completely Automated Public Turing Test To Tell Computers and Humans Apart.
Possessed object
Any item that you must carry to gain access to a computer or computer facility.
Biometric Device
Authenticates a person's identity by translating a personal characteristic.
Digital Forensics
Network forensics, or cyber forensics, is the discovery, collection, and analysis of evidence found on computers and networks.
RSI
Repetitive strain injury. An injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
CVS
Computer vision syndrome. Is a condition due to computer usage, from staring at a computer to long.
Ergonomics
An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
Computer addiction
Occurs when the computer consumes someone's entire social life.
Computer Ethics
Are the moral guild lines that govern the use of computers and information systems.
National Press Photographers
They oppose any manipulation often images.
Intellectual Property Rights
Are the rights to which creators are entitled for their work.
Copyright
Gives authors and artists exclusive rights to duplicate, publish, and sell their materials.
Green computing
Involves reducing the electricity and environmental waste while using a computer
Energy Star Program
to help reduce the amount of electricity used by computers and related devices. Government mandated
Information privacy
Is the right of individuals and companies to deny or restrict the collection and use of info about them.
Electronic Profile
Your personal info you put into the computer for subscriptions that go into your database and all your info is then your profile.
Cookie
Is a small text file that a Web-server stores on your computer. Contains user names and passwords
Spyware
Is a program placed on a computer without the user's knowledge that secretly collects info about the user.
Adware
Is a program that displays an online advertisement in a banner or pop-up window.
Spam
An unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once.
Phishing
Is a scam in which a perpetrator sends official looking e-mail message that attempts to obtain your personal and financial info. via e-mail
Pharming
Is a scam, where a perpetrator attempts to obtain your personal and financial info. via spoofing
Social Engineering
Gaining unauthorized access or obtaining confidential info by taking advantage of the trusting human nature of some victims and the naivety of others
Employee Monitoring
Involves the use of computers to observe, record, and review an employee's use of a computer, including communications, keyboard activity, and web-sites visited.
Content filtering
The process of restricting access to certain material on the web.
Hardware theft
Is the act of stealing computer equipment.
Hardware vandalism
Is the act of defacing or destroying computer equipment.
encryption key
Is a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
plaintext
Text that you can read.
ciphertext
Text that is all mixed up and is unreadable.
Digital signature
Is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender.
Digital certificate
Is a notice that guarantees a user or a Web site is legitimate.
Certificate authority
Is an authorized or a company that issues and verifies digital certificates.
System failure
is the prolonged malfunction of a computer. Loss of hardware, software, data, and instructions.
Software theft
Occurs when someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers and/or activates a program.
License agreement
Is the right to use the software.
Information theft
Occurs when someone steals personal or confidential information.
Encryption
The process of converting readable data into unreadable characters to prevent unauthorized access.
Decrypt
Or decipher, it into a readable form.
Encryption algorithm
Set of steps that can convert readable plaintext into unreadable ciphertext.
Surge protector
Uses special electrical components to provide a stable current flow to the computer and other electronic equipment.
UPS
Uninterruptible power supply. Is a device that contains surge protection circuits and one or more batteries that can provide power during a loss of power.
Backup
A duplicate file, program, or disk that can be used if the original is lost, damaged, or destroyed.
Restore
You copy the backed up files to their original location on the computer.
WAP
Wireless access point. Should be configured so that it does not broadcast a network name.
War driving
Individuals attempt to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network.
WPA
Wi-Fi Protected Access. Is a security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques.
802.lli or WPA2
The most recent network security standard, conforms to the government's security standards and uses more sophisticated encryption techniques than WPA.