Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
75 Cards in this Set
- Front
- Back
any event or action that could cuase a loss of or damage to computer hardware, software, data, information, or processing ablility
|
Computer Security Risk
|
|
any illegal act involving a computer
|
Computer Crime
|
|
online of Internet-based illegal acts
|
Cybercrime
|
|
someone who accesses a computer or network illegally
|
Hacker
|
|
someone who accesses a computer or network illegally with the intent of destroying data, stealing into, or other malicious actions
|
Cracker
|
|
someone with the same intent as a cracker, but does not have the technical skills and knowledge
|
Script Kiddie
|
|
people who have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and info
|
Corporate Spies
|
|
someone who uses email as a vehicle for extortion
|
Cyberextortionist
|
|
programs that act without the user's knowledge and deliberately alter the computer's operations
|
Malware
|
|
potentially damaging computer program that infects a file and negatively alters the way the computer works without the user's knowledge or permission
|
Computer Virus
|
|
program that copies itself repeatedly using up resources and possibly shutting down a computer or a network
|
Worm
|
|
program that hides within or looks like a legitimate program
|
Trojan Horse
|
|
program that hides in a computer and allows someone in a remote location to take full control of the computer
|
Rootkit
|
|
the destructive event or prank the program is intended to deliver
|
Payload
|
|
How many Web sites can currently infect your computer with Malware?
|
over 300,000
|
|
What are 5 ways a user can sause malware to infect his computer?
|
1. opening an infected file 2. running an infected program 3. boot the computer with infected removable media inserted in a drive or plugged into a port 4. connecting an unprotected computer to a network 5. when a certain condition or event occurs
|
|
an organization or person you believe will not send you a virus infected file knowingly
|
Trusted Source
|
|
group of compromised computers connected to a network that are used as a part of the network that attacs other networks
|
Botnet
|
|
a compromised computer whose owner is unaware that the computer is being controlled by an outsider
|
Zombie
|
|
(Denial of Service Attack) an assult whose purpose is to disrupt a computer's access to an Internet service
|
DoS Attack
|
|
a program or set of instructions in a program that that allow users to bypass security control when accessing a program, computer, or network
|
Back Door
|
|
a technique that intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
|
Spoofing
|
|
List and explain 2 ways to safeguard against botnets, DoS attacks, and Spoofing
|
1. implement firewall solutions- hardware and/or softwarethat protects a network's resources from intrusion by users on another network such as the Internet 2. install intrustion detection software- automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access, and notifies network administratorsof suspicious behavior patterns or system breaches
|
|
use of a computer or its data for unapproved or possibly illegal activities
|
Unauthorized Use
|
|
the use of a computer or network without permission
|
Unauthorized Access
|
|
List 2 ways to safeguard against unauthorized use and access
|
1. passwords and usernames 2. identifying and authenticaating users
|
|
(Completely Automated Public Turing test to tell Computers and Humans Apart) program that verifies user input is not computer generated
|
CAPTCHA
|
|
any item that you must carry to gain access to a computer or compuer facility
|
Possessed Object
|
|
authenticates a person's identity by translating a personal characteristic into a digital code that is compared with a digital code stored in the computer verifying a physical or behavorial characteristic
|
Biometric Devide
|
|
descovery, collection, and analysis of evidence found on computers and networks
|
Digital Forensics
|
|
the act of stealing computer equipment
|
Hardware Theft
|
|
the act of defacing or destroying computer equipment
|
Hardware Vandalism
|
|
occurs when someone steals software media, intentionally erases programs, or illegally registers and/or activates a program
|
Software Theft
|
|
the right to use the software that you don't own
|
License Agreement
|
|
occurs when someone steals personal or confidential information
|
Information Theft
|
|
the process of converting readavle data into unreadable characters to prevent unauthorized access
|
Encryption
|
|
to decipher unreadable data
|
Decrypt
|
|
a set of steps that can convert readable plain text into unrreadavle ciphertext
|
Encryption Algorithm
|
|
a programmed formula that the originator of the data uses to encrypt the plain text and the recipient of the data uses to decrypt the cipher text
|
Encryption Key
|
|
unencrypted, readable data
|
Plain Text
|
|
encrypted, unreadable data
|
Ciphertext
|
|
an encrypted code that a person, Web site, or organization attaches to a digital message to verify the identity of the message sender
|
Digital Signature
|
|
a notice that guarantees a user or Web site is legitimate
|
Digital Certificate
|
|
an authorized person or company that issues and verifies digital certificates
|
Certificate Authority
|
|
the prolonged malfunction of a computer
|
System Failure
|
|
device that uses special electrical components to provide a stable current flow to the computer and other electronic equipment
|
Surge Protector
|
|
(uninterruptable power supply) device that contains surge protection circuits and one or more batteries that can provide power during a loss of power
|
UPS
|
|
a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
|
Backup
|
|
to copy the backed up files to their original locations on the computer
|
Restore
|
|
What percentage of wireless neworks have no security?
|
80%
|
|
point at which a use can access a wirless network or the Internet
|
WAP
|
|
technique where individuals attempt to detect wireless networksvia their notebook computer or mobile device while driving a vehicle through areas they suspect havve a wireless network
|
War Driving
|
|
security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques
|
WPA
|
|
the most recent network security standard that conforms to government security standards and uses more sophisticated encryption techniques than WPA
|
802.11i or WPA2
|
|
injury or disorder of the muscles, nerves, tendons, ligaments, and joints caused by repetitive use
|
RSI (repetitive strain injury)
|
|
health-related condition due to computer usage that affects the eyes negatively
|
CVS (computer vision syndrome)
|
|
an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
|
Ergonomics
|
|
occurs when the computer comsumes someone's entire social life
|
Computer Addiction
|
|
the moral guidelines that govern the use of computers and information systems
|
Computer Ethics
|
|
a group that completely opposes any manipulation of an image
|
National Press Photographers
|
|
the rights to which creators are entitle for their work
|
Intellectual Property Rights
|
|
gives authors and artists exclusive rights to duplicate, publish, and sell their materials
|
Copyright
|
|
involves reducing the electricity and environmental waste while using a comptuer
|
Green Computing
|
|
program developed by US to help reduce the amount of electricty used by computers and related devices
|
Energy Star Program
|
|
refers to the right of individuals and companies to deny or restrict the collection and use of information about them
|
Information Privacy
|
|
combination of data from when users fill out a form or click on an ad or register software online and data from public sources of an indivual
|
Electronic Profile
|
|
a small text file that a Web server stores on your computer
|
Cookie
|
|
a program placed on a computer without the user's knowledge that secretly collects information about the user
|
Spyware
|
|
a program that displays an online advertisement in a banner or pop-up window on a Web page, email message, or other Internet services
|
Adware
|
|
unsolicited email message or newsgroup posting sent to multiple recipients or newgroups at once/ Internet junk mail
|
Spam
|
|
a scam in which a perptrator sends official looking email messages that attempt to obtain your personal and financial information
|
Phishing
|
|
a scam where a perptrator attempts to obtain your personal and financial information via spoofing
|
Pharming
|
|
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victimsand the naivety of others
|
Social Engineering
|
|
involves the use of computers to observe, record, and review an employee's use of a computer, including communications
|
Employee Monitoring
|
|
the process of restricing access to certain material on the Web
|
Content Filtering
|