• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/51

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

51 Cards in this Set

  • Front
  • Back
computer security risk
any event or action that could cause damage to a computer
computer crime
any illegal act involving a computer
cybercrime
internet based illegal acts
hacker
someone who accesses a computer illegally
cracker
someone who steals or destroys data on a computer
script kiddie
cracker that does not have the technical skills and knowledge
cyberextortionist
someone who uses email as a vehicle for exortion
malware
anything that harms a computer
types of maleware
virus, worm, trojan horse and rootkit.
trusted source
an organization that wont send you a virus
botnet
a group of compromised computers
zombie
when an owner is unware that the computer is being controlled
DOS attack
an assukt to disrupt computer access
back door
a program that lets users bypass security
spoofing
a technique used to get information
CAPTCHA
means completely automated public turing ans it tells humans and computers apart
possessed object
any item that you carry with you gains access to a computer
biometic device
authenticates a persons identityor characteristic
digital forensics
the collection of evidence found on a computer
hardware theft
act of stealing a computers equipment
botnet
a group of compromised computers
zombie
when an owner is unware that the computer is being controlled
DOS attack
an assukt to disrupt computer access
back door
a program that lets users bypass security
spoofing
a technique used to get information
CAPTCHA
means completely automated public turing ans it tells humans and computers apart
possessed object
any item that you carry with you gains access to a computer
biometic device
authenticates a persons identityor characteristic
digital forensics
the collection of evidence found on a computer
hardware theft
act of stealing a computers equipment
hardware theft
act of stealing computer equipment
hardware vandalism
act of defacing computers equipment
software theft
occurs when someone steals software media
license agreement
the right to use software
information theft
occurs when someone steals personal information
encryption
the process of converting unreadable data
decrypt
making something into readible form
encryption algorithm
makes letters convert into cyphertext
encryption key
a programmed formula to decrypt the cyphertext
plaintext
the text before encryption
digital signature
an encryptic code a person attaches to a message
digital certificate
garuntees a user of legitimacy
certificate authority
authorizes and verifies certification
system failure
the prolonged malfunction of a computer
surge protector
uses special electrical components to stablize flow of data
UPS
a device that contains surge protection
backup
to make a copy of something on the computer
restore
copying files to their origanal location
WAP
wireless access point
war driving
individuals who detect wireless networks
WPA
a security standard that improves older security