Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
45 Cards in this Set
- Front
- Back
Computer Security Risk
|
any event that could cause a loss of or damage to computer hardware, software, data, info., or processing capabilities
|
|
Computer Crime
|
any illegal act involving a computer
|
|
Cybercrime
|
online or Internet-based illegal acts
|
|
Hacker
|
derogatory, refers to someone who accesses a computer or network illegally
|
|
Cracker
|
someone who accesses a computer or network illegally with the intent of destroying data, stealing info., or other malicious action
|
|
Script Kiddie
|
same intent as cracker, but doesn't have the technical skills or knowledge, often use prewritten hacking and cracking programs to break into computers
|
|
Corporate Spies
|
people hired to break into a specific computer to steal data and info. to gain their company an advantage
|
|
Cyberextortionist
|
someone who uses e-mail as a vehicle for extortion. They send threatening e-mails to companies saying they'll expose expose private info., exploit a security flaw, or launch an attack that will compromise the network if they aren't paid a certain sum of money
|
|
Malware
|
(malicious software) programs that act without a user's knowledge and deliberately alter a computer's operations
|
|
Payload
|
the destructive event or prank the program is intended to deliver
|
|
Trusted Source
|
an organization or person you believe will not send a virus infected file knowingly
|
|
Botnet
|
a group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes
|
|
Zombie
|
compromised computer whose owner is unaware the computer is being controlled remotely by an outsider
|
|
DoS Attack
|
(denial of service attack) an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail
|
|
Back Door
|
a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network
|
|
Spoofing
|
technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
|
|
Unauthorized Use
|
the use of a computer or its data for unapproved or possibly illegal activities
|
|
Unauthorized Access
|
the use of a computer or network without permission
|
|
CAPTCHA
|
(Completely Automated Public Turing test to tell Computers and Humans Apart) program that verifies user input is not computer generated
|
|
Possessed Object
|
any item that you must carry to gain access to a computer or computer facility
|
|
Biometric Device
|
authenticates a person's identity by translating a personal characteristic such as a fingerprint into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic
|
|
Digital Forensics
|
(computer forensics, network forensics, cyberforensics) discovery, collection, and analysis of evidence found on computers and networks
|
|
Hardware Theft
|
the act of stealing computer equipment
|
|
Hardware Vandalism
|
the act of defacing or destroying computer equipment
|
|
Software Theft
|
occurs when someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers and/or activates a program
|
|
License Agreement
|
the right to use the software
|
|
Information Theft
|
occurs when someone steals personal or confidential info.
|
|
Encryption
|
the process of converting readable data into unreadable characters to prevent unauthorized access
|
|
Decrypt
|
decipher data into a readable form
|
|
Encryption Algorithm
|
A set of steps that can convert readable plaintext into unreadable ciphertext
|
|
Encryption Key
|
a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext
|
|
Plaintext
|
unencrypted, readable data
|
|
Ciphertext
|
encrypted, scrambled data
|
|
Digital Signature
|
encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender
|
|
Digital Certificate
|
a notice that guarantees a user or a Web site is legitimate
|
|
Certificate Authority (CA)
|
authorized person or a company that issues and verifies digital certificates
|
|
System Failure
|
prolonged malfunction of a computer
|
|
Surge Protector
|
uses special electrical components to provide a stable current flow to the computer and other electronic components
|
|
UPS
|
(uninterruptible power supply) device that contains surge protection circuits and one or more batteries that can provide power during a loss of power
|
|
backup
|
duplicate file, program, or disk that can be used if the original is lost, damaged, or destroyed
|
|
Restore
|
used in case of system failure or discovery of corrupted files, restore files by copying the backed up files to their original location on the computer
|
|
WAP
|
(wireless access point) unsecured connection point to the Internet
|
|
War Driving
|
individuals attempt to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network
|
|
WPA
|
(Wi-Fi protected access) security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques
|
|
802.11i or WPA2
|
most recent network security standard, conforms to the gov't's security standards and uses more sophisticated encryption techniques than WPA.
|