• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/66

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

66 Cards in this Set

  • Front
  • Back
any event or action that could cause a loss of or damage to the computer hardware, software, data information, or the processor
Computer Security Risk
any illegal act involving a computer
Computer Crime
online or internet based acts
Cyber crime
someone who accesses a computer or network illegally
Hacker
someone who accesses a computer or network illegally but has the intention of destroying data
Cracker
same intent as a cracker but not as much skill
Script Kiddie
people hired to break into a specific computer and steal its proprietary data and info
Corporate spies
someone who uses e-mail as a vehicle for extortion
Cyberextortionist
programs that act without a users knowledge and deliberately alters the computers operations
Malware (malicious software)
destructive event or prank the program is intended to deliver
Payload
an organization or person you believe will not send you a virus intentionally
Trusted Source
group of compromised computers connected to a network such as the internet to attack other services
Botnet
one whose owner is unaware the computer is being controlled by an outsider
Zombie
an assault whose purpose is to disrupt computer access to and internet service
DoS Attack
a program or set of instructions in a program that allow users to bypass security controls
Back door
a technique intruders use to make their network or internet transmission appear real
Spoofing
use of a computer or its data for unapproved activity
Unauthorized use
use of a computer or network without permission
Unauthorized Access
a program that verifies users input is not computer generated
CAPTCHA (Completely Automated Public turing Test to tell Humans and Computers Apart)
any item that you must carry to gain access to a computer
Possesed object
authenticates a persons identity by translating a personal characteristic
Biometric device
the discovery,collection,and analysis found on computers and networks
Digital Forensics
the act of stealing computer equipment
Hardware theft
the act of destroying or defacing computer equipment
Hardware vandalism
when someone steals media, erases programs, copies a program, or illegally registers a program
Software theft
the right to use the software
License agreement
when someone steals personal or confidential information
Information theft
the process of turning readable data into unreadable characters
Encryption
to decipher
decrypt
set of steps that convert readable plaintext into unreadable cipher text
Encryption algorithm
a programmed formula that the originator of the data uses to encrypt the plaintext
Encryption key
readable data
Plaintext
unreadable plaintext
Ciphertext
an encrypted code that a person,website,or organization attaches to an electronic f=message
Digital signurature
a notice that guarantees a user or website real
Digital Certificate
an authorized person or company that issues and verifies digital certificates
Certificate authority
the prolonged malfunction of a computer
System failure
an item that protects against electrical power variations
Surge protector
a device that contains protection circuits and a battery for backup without power
UPS (Uninterpretable Power Supply)
a duplicate file, program, or disk that can be used if the original is lost or damaged
Backup
to make good again, to replace with the same item
Restore
a location to receive wireless internet
WAP (Wireless Access Point)
driving with a computer to check if wireless is at a place they suspect
War driving
Less sophisticated version of 802.11i
WPA (Wi-Fi Protected Access)
recent security standard with more sophisticated encryption than WPA
802.11i or WPA2
repetitive strain injury. An injury or disorder of the muscles, nerves, tendons, ligaments, and joints. Computer related tendonitis and carpul tunnel syndrome caused by repetitive use.
RSI repitive strain injury
computer vision syndrome. Another type of heath-related condition due to computer usage. Trouble with eyes for staring at screen.
CVS computer vision syndrome
is an applied science devoted to incorporating comfort, efficiency, and safely into the design of items in the workplace.
Ergonomics
Occurs when the computer consumes someone's entire social life.
Computer Addiction
Are the moral guild lines that govern the use of computers and information systems.
Computer Ethics
They oppose any manipulation often images
National Press Photographers
Are the rights to which creators are entitled for their work.
Intellectual Property Rights
Gives authors and artists exclusive rights to duplicate, publish, and sell their materials.
Copyright
Involves reducing the electricity and environmental waste while using a computer
Green computing
to help reduce the amount of electricity used by computers and related devices. Government mandated
Energy Star Program
Is the right of individuals and companies to deny or restrict the collection and use of info about them.
Information privacy
Your personal info you put into the computer for subscriptions that go into your database and all your info is then your profile.
Electronic Profile
Is a small text file that a Web-server stores on your computer. Contains user names and passwords
Cookie
Is a program placed on a computer without the user's knowledge that secretly collects info about the user.
Spyware
Is a program that displays an online advertisement in a banner or pop-up window.
Adware
An unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once.
Spam
Is a scam in which a perpetrator sends official looking e-mail message that attempts to obtain your personal and financial info. via e-mail
Phishing
Is a scam, where a perpetrator attempts to obtain your personal and financial info. via spoofing
Pharming
Gaining unauthorized access or obtaining confidential info by taking advantage of the trusting human nature of some victims and the naivety of others
Social Engineering
Involves the use of computers to observe, record, and review an employee's use of a computer, including communications, keyboard activity, and web-sites visited.
Employee Monitoring
The process of restricting access to certain material on the web.
Content filtering