Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
65 Cards in this Set
- Front
- Back
computer security risk
|
event or action that could cause a loss of or damage to computer hardware software or data
|
|
computer crime
|
an illegal act involving a computer
|
|
cybercrime
|
online based criminal acts
|
|
hacker
|
someone who accesses a computer or network illegally
|
|
cracker
|
someone who accesses a computer or network illegally with the intent of destroying data or info
|
|
script kiddie
|
same as a craker but uses predevelopted programs due to lack of computer skills to steal or destroy information on a computer
|
|
corprate spies
|
hired by companies to aquire software to gaINAN an advsntage in the business world
|
|
cyberextortionist
|
someone who uses email as a vehicle for extortion. use it as a threat to realase peronal info.
|
|
malware
|
computer virus. worm trojan horse rookit
|
|
payload
|
the end result of the event
|
|
trusted source
|
orgainzation or person you believe will not send you a virus
|
|
botnet
|
group fo compromised computers connected to a network.
|
|
zombie
|
compromised computer with an unaware owner that his computer is being comtrolled by some else
|
|
DoS attack
|
assault purpose to disrupt computer access to internet services.,/
|
|
back door attack
|
program allows users to bipass security controls.
|
|
spoofing
|
technique intruders use to make thir network appear legitmate to prople.
|
|
unauthorized use
|
use of a computer for unapproved illegal use.
|
|
unauthorizd access
|
use of a computer without permission
|
|
possessed object
|
item you must carry to gain access to a computer
|
|
digital forensics
|
dicovey of evidence found on a computer,
|
|
hardware theft
|
stealing of computer equiptment
|
|
hardware vandalism
|
act of defacing or destroying computer equiptment
|
|
software theft
|
stealing or reproducing software
|
|
license agreement
|
right to use the software. not own
|
|
information theft
|
stealing of personal information
|
|
encryption
|
process of converting readable data into unreadable charaters
|
|
decrypt
|
the deciphering of encryption text..
|
|
encryption algorithm
|
set of steps to convert readable plaintext into unreadable ciphertext
|
|
encryption key
|
formula that the creator of the data uses to encrypt the plaintext.
|
|
plaintext
|
readable data
|
|
ciphertext
|
unreadable data text on a computer
|
|
digital signature
|
encrypted code that a organization attaches to verify its identity..
|
|
digital certificate
|
noticce that gurantees a user or website legit
|
|
surge protector
|
special electircal compnents to provide a stable current flow to the computer.
|
|
UPS
|
device that contains surge protection circuts and batteries to provide power.
|
|
backup
|
duplicate of a file that can be used if file lost
|
|
restore
|
to put bakup files inplace of the original
|
|
war driving
|
individuals attempt to find wifi while driving their cars
|
|
RSI
|
injury diorder of the muscles nerves tondons joints
|
|
CVS
|
itchy eyes, unfocused, due to looking at screen for too long
|
|
Egronomics
|
applied science incorpersted comfort into workplace
|
|
computer addiction
|
comsumes entire social life is a growng problem
|
|
computer ethics
|
moral guidelines for computer use
|
|
National press photographers
|
against the manipulation of an y online image
|
|
intellectual property rights
|
rights to which creators are entitled for their work
|
|
cpoyright
|
gives authors and artists exclusive right to publish material. ,
|
|
grren computing
|
reducuing the amount fo electricity computers use.
|
|
information privacy
|
right of individuals and companies to deny collection of information reguarding them
|
|
cookie
|
small file that a web server stores on your computer. data about you
|
|
spyware
|
program ona computer that collects your personal information without your apprioved conesent.
|
|
adware
|
displays online advertisment
|
|
spam
|
unsolicited email sent to multiple addresses
|
|
phishing
|
spam wgere a intruder sends an official looking email mesage to gain peronal info
|
|
social engineering
|
gaining untohorized access to personal info by praying on the nieve human nature to trust
|
|
content filtering
|
process of restricitng access to certainj websites.
|
|
trusted source
|
orgainzation or person you believe will not send you a virus
|
|
botnet
|
group fo compromised computers connected to a network.
|
|
zombie
|
compromised computer with an unaware owner that his computer is being comtrolled by some else
|
|
DoS attack
|
assault purpose to disrupt computer access to internet services.,/
|
|
back door attack
|
program allows users to bipass security controls.
|
|
spoofing
|
technique intruders use to make thir network appear legitmate to prople.
|
|
unauthorized use
|
use of a computer for unapproved illegal use.
|
|
unauthorizd access
|
use of a computer without permission
|
|
possessed object
|
item you must carry to gain access to a computer
|
|
digital forensics
|
dicovey of evidence found on a computer,
|