• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back
Computer Security Risk
any event or action that could cause loss of or damage to computer hardware, software, and data
Computer Crime
any illigal act involving a computer generally centered to as a computer crime
Cybercrime
online/internet based crime/ criminal acts
Hacker
someone who acesses a computer or network illegally
Cracker
someone who acesses a computer or network illegally with the intent of destroying data / stealing information
Script Kiddie
some intent as a cracker but doesn't have the teen skills uses prewritten programs to crack and hack
Coperate spies
have excelent computer networking skills hired to break into a specific computer and steal its data companies hire them to gain advantages
cyberextortionists
someone who uses email as a vehicle for extraction use it as a threat to release confidential information
Melware
Computer viruses worms, trojan horses, etc. programs that act without a user knoldege and altetr the computer
payload
destructive event or prank the program is intended to deliver
trusted sourse
organization or person you believe will not send a virus infected file knowledge
Botnet
group of compromized computers connected to a network such as the internet that are used as a part of a network that attacks another network
Zombie
compromized computer who's owner is unaware that the computer is being controlled by an outsider
DOS Attack
denial of service assult whose purpose is to disrupt computer acess
back door
programs or set of instructions in a program that allows you to bypass security
spoofing
technique intruders use to make their network appear regilament to a victim computer or network
unauthorized use
use of a computer or its data for unapproved or possible illigal activities
unauthorized acess
use of a computer or network without permission
CAPTCHA
completely automated public turnin test to tell computers and humans apart
processed object
any item you must carry to gain acess to a computer facility
Biometric Device
authenticates a persons's idenity by transmitting a personal charateristic into a digital code
Digital forensics
discovery collection of vindence found on computers