• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/75

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

75 Cards in this Set

  • Front
  • Back
any event or action that could cuase a loss of or damage to computer hardware, software, data, information, or processing ablility
Computer Security Risk
any illegal act involving a computer
Computer Crime
online of Internet-based illegal acts
Cybercrime
someone who accesses a computer or network illegally
Hacker
someone who accesses a computer or network illegally with the intent of destroying data, stealing into, or other malicious actions
Cracker
someone with the same intent as a cracker, but does not have the technical skills and knowledge
Script Kiddie
people who have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and info
Corporate Spies
someone who uses email as a vehicle for extortion
Cyberextortionist
programs that act without the user's knowledge and deliberately alter the computer's operations
Malware
potentially damaging computer program that infects a file and negatively alters the way the computer works without the user's knowledge or permission
Computer Virus
program that copies itself repeatedly using up resources and possibly shutting down a computer or a network
Worm
program that hides within or looks like a legitimate program
Trojan Horse
program that hides in a computer and allows someone in a remote location to take full control of the computer
Rootkit
the destructive event or prank the program is intended to deliver
Payload
How many Web sites can currently infect your computer with Malware?
over 300,000
What are 5 ways a user can sause malware to infect his computer?
1. opening an infected file 2. running an infected program 3. boot the computer with infected removable media inserted in a drive or plugged into a port 4. connecting an unprotected computer to a network 5. when a certain condition or event occurs
an organization or person you believe will not send you a virus infected file knowingly
Trusted Source
group of compromised computers connected to a network that are used as a part of the network that attacs other networks
Botnet
a compromised computer whose owner is unaware that the computer is being controlled by an outsider
Zombie
(Denial of Service Attack) an assult whose purpose is to disrupt a computer's access to an Internet service
DoS Attack
a program or set of instructions in a program that that allow users to bypass security control when accessing a program, computer, or network
Back Door
a technique that intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
Spoofing
List and explain 2 ways to safeguard against botnets, DoS attacks, and Spoofing
1. implement firewall solutions- hardware and/or softwarethat protects a network's resources from intrusion by users on another network such as the Internet 2. install intrustion detection software- automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access, and notifies network administratorsof suspicious behavior patterns or system breaches
use of a computer or its data for unapproved or possibly illegal activities
Unauthorized Use
the use of a computer or network without permission
Unauthorized Access
List 2 ways to safeguard against unauthorized use and access
1. passwords and usernames 2. identifying and authenticaating users
(Completely Automated Public Turing test to tell Computers and Humans Apart) program that verifies user input is not computer generated
CAPTCHA
any item that you must carry to gain access to a computer or compuer facility
Possessed Object
authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code stored in the computer verifying a physical or behavorial characteristic
Biometric Devide
descovery, collection, and analysis of evidence found on computers and networks
Digital Forensics
the act of stealing computer equipment
Hardware Theft
the act of defacing or destroying computer equipment
Hardware Vandalism
occurs when someone steals software media, intentionally erases programs, or illegally registers and/or activates a program
Software Theft
the right to use the software that you don't own
License Agreement
occurs when someone steals personal or confidential information
Information Theft
the process of converting readavle data into unreadable characters to prevent unauthorized access
Encryption
to decipher unreadable data
Decrypt
a set of steps that can convert readable plain text into unrreadavle ciphertext
Encryption Algorithm
a programmed formula that the originator of the data uses to encrypt the plain text and the recipient of the data uses to decrypt the cipher text
Encryption Key
unencrypted, readable data
Plain Text
encrypted, unreadable data
Ciphertext
an encrypted code that a person, Web site, or organization attaches to a digital message to verify the identity of the message sender
Digital Signature
a notice that guarantees a user or Web site is legitimate
Digital Certificate
an authorized person or company that issues and verifies digital certificates
Certificate Authority
the prolonged malfunction of a computer
System Failure
device that uses special electrical components to provide a stable current flow to the computer and other electronic equipment
Surge Protector
(uninterruptable power supply) device that contains surge protection circuits and one or more batteries that can provide power during a loss of power
UPS
a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
Backup
to copy the backed up files to their original locations on the computer
Restore
What percentage of wireless neworks have no security?
80%
point at which a use can access a wirless network or the Internet
WAP
technique where individuals attempt to detect wireless networksvia their notebook computer or mobile device while driving a vehicle through areas they suspect havve a wireless network
War Driving
security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques
WPA
the most recent network security standard that conforms to government security standards and uses more sophisticated encryption techniques than WPA
802.11i or WPA2
injury or disorder of the muscles, nerves, tendons, ligaments, and joints caused by repetitive use
RSI (repetitive strain injury)
health-related condition due to computer usage that affects the eyes negatively
CVS (computer vision syndrome)
an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
Ergonomics
occurs when the computer comsumes someone's entire social life
Computer Addiction
the moral guidelines that govern the use of computers and information systems
Computer Ethics
a group that completely opposes any manipulation of an image
National Press Photographers
the rights to which creators are entitle for their work
Intellectual Property Rights
gives authors and artists exclusive rights to duplicate, publish, and sell their materials
Copyright
involves reducing the electricity and environmental waste while using a comptuer
Green Computing
program developed by US to help reduce the amount of electricty used by computers and related devices
Energy Star Program
refers to the right of individuals and companies to deny or restrict the collection and use of information about them
Information Privacy
combination of data from when users fill out a form or click on an ad or register software online and data from public sources of an indivual
Electronic Profile
a small text file that a Web server stores on your computer
Cookie
a program placed on a computer without the user's knowledge that secretly collects information about the user
Spyware
a program that displays an online advertisement in a banner or pop-up window on a Web page, email message, or other Internet services
Adware
unsolicited email message or newsgroup posting sent to multiple recipients or newgroups at once/ Internet junk mail
Spam
a scam in which a perptrator sends official looking email messages that attempt to obtain your personal and financial information
Phishing
a scam where a perptrator attempts to obtain your personal and financial information via spoofing
Pharming
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victimsand the naivety of others
Social Engineering
involves the use of computers to observe, record, and review an employee's use of a computer, including communications
Employee Monitoring
the process of restricing access to certain material on the Web
Content Filtering