Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
51 Cards in this Set
- Front
- Back
computer security risk
|
any event or action that could cause damage to a computer
|
|
computer crime
|
any illegal act involving a computer
|
|
cybercrime
|
internet based illegal acts
|
|
hacker
|
someone who accesses a computer illegally
|
|
cracker
|
someone who steals or destroys data on a computer
|
|
script kiddie
|
cracker that does not have the technical skills and knowledge
|
|
cyberextortionist
|
someone who uses email as a vehicle for exortion
|
|
malware
|
anything that harms a computer
|
|
types of maleware
|
virus, worm, trojan horse and rootkit.
|
|
trusted source
|
an organization that wont send you a virus
|
|
botnet
|
a group of compromised computers
|
|
zombie
|
when an owner is unware that the computer is being controlled
|
|
DOS attack
|
an assukt to disrupt computer access
|
|
back door
|
a program that lets users bypass security
|
|
spoofing
|
a technique used to get information
|
|
CAPTCHA
|
means completely automated public turing ans it tells humans and computers apart
|
|
possessed object
|
any item that you carry with you gains access to a computer
|
|
biometic device
|
authenticates a persons identityor characteristic
|
|
digital forensics
|
the collection of evidence found on a computer
|
|
hardware theft
|
act of stealing a computers equipment
|
|
botnet
|
a group of compromised computers
|
|
zombie
|
when an owner is unware that the computer is being controlled
|
|
DOS attack
|
an assukt to disrupt computer access
|
|
back door
|
a program that lets users bypass security
|
|
spoofing
|
a technique used to get information
|
|
CAPTCHA
|
means completely automated public turing ans it tells humans and computers apart
|
|
possessed object
|
any item that you carry with you gains access to a computer
|
|
biometic device
|
authenticates a persons identityor characteristic
|
|
digital forensics
|
the collection of evidence found on a computer
|
|
hardware theft
|
act of stealing a computers equipment
|
|
hardware theft
|
act of stealing computer equipment
|
|
hardware vandalism
|
act of defacing computers equipment
|
|
software theft
|
occurs when someone steals software media
|
|
license agreement
|
the right to use software
|
|
information theft
|
occurs when someone steals personal information
|
|
encryption
|
the process of converting unreadable data
|
|
decrypt
|
making something into readible form
|
|
encryption algorithm
|
makes letters convert into cyphertext
|
|
encryption key
|
a programmed formula to decrypt the cyphertext
|
|
plaintext
|
the text before encryption
|
|
digital signature
|
an encryptic code a person attaches to a message
|
|
digital certificate
|
garuntees a user of legitimacy
|
|
certificate authority
|
authorizes and verifies certification
|
|
system failure
|
the prolonged malfunction of a computer
|
|
surge protector
|
uses special electrical components to stablize flow of data
|
|
UPS
|
a device that contains surge protection
|
|
backup
|
to make a copy of something on the computer
|
|
restore
|
copying files to their origanal location
|
|
WAP
|
wireless access point
|
|
war driving
|
individuals who detect wireless networks
|
|
WPA
|
a security standard that improves older security
|