Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
66 Cards in this Set
- Front
- Back
any event or action that could cause a loss of or damage to the computer hardware, software, data information, or the processor
|
Computer Security Risk
|
|
any illegal act involving a computer
|
Computer Crime
|
|
online or internet based acts
|
Cyber crime
|
|
someone who accesses a computer or network illegally
|
Hacker
|
|
someone who accesses a computer or network illegally but has the intention of destroying data
|
Cracker
|
|
same intent as a cracker but not as much skill
|
Script Kiddie
|
|
people hired to break into a specific computer and steal its proprietary data and info
|
Corporate spies
|
|
someone who uses e-mail as a vehicle for extortion
|
Cyberextortionist
|
|
programs that act without a users knowledge and deliberately alters the computers operations
|
Malware (malicious software)
|
|
destructive event or prank the program is intended to deliver
|
Payload
|
|
an organization or person you believe will not send you a virus intentionally
|
Trusted Source
|
|
group of compromised computers connected to a network such as the internet to attack other services
|
Botnet
|
|
one whose owner is unaware the computer is being controlled by an outsider
|
Zombie
|
|
an assault whose purpose is to disrupt computer access to and internet service
|
DoS Attack
|
|
a program or set of instructions in a program that allow users to bypass security controls
|
Back door
|
|
a technique intruders use to make their network or internet transmission appear real
|
Spoofing
|
|
use of a computer or its data for unapproved activity
|
Unauthorized use
|
|
use of a computer or network without permission
|
Unauthorized Access
|
|
a program that verifies users input is not computer generated
|
CAPTCHA (Completely Automated Public turing Test to tell Humans and Computers Apart)
|
|
any item that you must carry to gain access to a computer
|
Possesed object
|
|
authenticates a persons identity by translating a personal characteristic
|
Biometric device
|
|
the discovery,collection,and analysis found on computers and networks
|
Digital Forensics
|
|
the act of stealing computer equipment
|
Hardware theft
|
|
the act of destroying or defacing computer equipment
|
Hardware vandalism
|
|
when someone steals media, erases programs, copies a program, or illegally registers a program
|
Software theft
|
|
the right to use the software
|
License agreement
|
|
when someone steals personal or confidential information
|
Information theft
|
|
the process of turning readable data into unreadable characters
|
Encryption
|
|
to decipher
|
decrypt
|
|
set of steps that convert readable plaintext into unreadable cipher text
|
Encryption algorithm
|
|
a programmed formula that the originator of the data uses to encrypt the plaintext
|
Encryption key
|
|
readable data
|
Plaintext
|
|
unreadable plaintext
|
Ciphertext
|
|
an encrypted code that a person,website,or organization attaches to an electronic f=message
|
Digital signurature
|
|
a notice that guarantees a user or website real
|
Digital Certificate
|
|
an authorized person or company that issues and verifies digital certificates
|
Certificate authority
|
|
the prolonged malfunction of a computer
|
System failure
|
|
an item that protects against electrical power variations
|
Surge protector
|
|
a device that contains protection circuits and a battery for backup without power
|
UPS (Uninterpretable Power Supply)
|
|
a duplicate file, program, or disk that can be used if the original is lost or damaged
|
Backup
|
|
to make good again, to replace with the same item
|
Restore
|
|
a location to receive wireless internet
|
WAP (Wireless Access Point)
|
|
driving with a computer to check if wireless is at a place they suspect
|
War driving
|
|
Less sophisticated version of 802.11i
|
WPA (Wi-Fi Protected Access)
|
|
recent security standard with more sophisticated encryption than WPA
|
802.11i or WPA2
|
|
repetitive strain injury. An injury or disorder of the muscles, nerves, tendons, ligaments, and joints. Computer related tendonitis and carpul tunnel syndrome caused by repetitive use.
|
RSI repitive strain injury
|
|
computer vision syndrome. Another type of heath-related condition due to computer usage. Trouble with eyes for staring at screen.
|
CVS computer vision syndrome
|
|
is an applied science devoted to incorporating comfort, efficiency, and safely into the design of items in the workplace.
|
Ergonomics
|
|
Occurs when the computer consumes someone's entire social life.
|
Computer Addiction
|
|
Are the moral guild lines that govern the use of computers and information systems.
|
Computer Ethics
|
|
They oppose any manipulation often images
|
National Press Photographers
|
|
Are the rights to which creators are entitled for their work.
|
Intellectual Property Rights
|
|
Gives authors and artists exclusive rights to duplicate, publish, and sell their materials.
|
Copyright
|
|
Involves reducing the electricity and environmental waste while using a computer
|
Green computing
|
|
to help reduce the amount of electricity used by computers and related devices. Government mandated
|
Energy Star Program
|
|
Is the right of individuals and companies to deny or restrict the collection and use of info about them.
|
Information privacy
|
|
Your personal info you put into the computer for subscriptions that go into your database and all your info is then your profile.
|
Electronic Profile
|
|
Is a small text file that a Web-server stores on your computer. Contains user names and passwords
|
Cookie
|
|
Is a program placed on a computer without the user's knowledge that secretly collects info about the user.
|
Spyware
|
|
Is a program that displays an online advertisement in a banner or pop-up window.
|
Adware
|
|
An unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once.
|
Spam
|
|
Is a scam in which a perpetrator sends official looking e-mail message that attempts to obtain your personal and financial info. via e-mail
|
Phishing
|
|
Is a scam, where a perpetrator attempts to obtain your personal and financial info. via spoofing
|
Pharming
|
|
Gaining unauthorized access or obtaining confidential info by taking advantage of the trusting human nature of some victims and the naivety of others
|
Social Engineering
|
|
Involves the use of computers to observe, record, and review an employee's use of a computer, including communications, keyboard activity, and web-sites visited.
|
Employee Monitoring
|
|
The process of restricting access to certain material on the web.
|
Content filtering
|