Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
22 Cards in this Set
- Front
- Back
Computer Security Risk
|
any event or action that could cause loss of or damage to computer hardware, software, and data
|
|
Computer Crime
|
any illigal act involving a computer generally centered to as a computer crime
|
|
Cybercrime
|
online/internet based crime/ criminal acts
|
|
Hacker
|
someone who acesses a computer or network illegally
|
|
Cracker
|
someone who acesses a computer or network illegally with the intent of destroying data / stealing information
|
|
Script Kiddie
|
some intent as a cracker but doesn't have the teen skills uses prewritten programs to crack and hack
|
|
Coperate spies
|
have excelent computer networking skills hired to break into a specific computer and steal its data companies hire them to gain advantages
|
|
cyberextortionists
|
someone who uses email as a vehicle for extraction use it as a threat to release confidential information
|
|
Melware
|
Computer viruses worms, trojan horses, etc. programs that act without a user knoldege and altetr the computer
|
|
payload
|
destructive event or prank the program is intended to deliver
|
|
trusted sourse
|
organization or person you believe will not send a virus infected file knowledge
|
|
Botnet
|
group of compromized computers connected to a network such as the internet that are used as a part of a network that attacks another network
|
|
Zombie
|
compromized computer who's owner is unaware that the computer is being controlled by an outsider
|
|
DOS Attack
|
denial of service assult whose purpose is to disrupt computer acess
|
|
back door
|
programs or set of instructions in a program that allows you to bypass security
|
|
spoofing
|
technique intruders use to make their network appear regilament to a victim computer or network
|
|
unauthorized use
|
use of a computer or its data for unapproved or possible illigal activities
|
|
unauthorized acess
|
use of a computer or network without permission
|
|
CAPTCHA
|
completely automated public turnin test to tell computers and humans apart
|
|
processed object
|
any item you must carry to gain acess to a computer facility
|
|
Biometric Device
|
authenticates a persons's idenity by transmitting a personal charateristic into a digital code
|
|
Digital forensics
|
discovery collection of vindence found on computers
|