• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/65

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

65 Cards in this Set

  • Front
  • Back
computer security risk
event or action that could cause a loss of or damage to computer hardware software or data
computer crime
an illegal act involving a computer
cybercrime
online based criminal acts
hacker
someone who accesses a computer or network illegally
cracker
someone who accesses a computer or network illegally with the intent of destroying data or info
script kiddie
same as a craker but uses predevelopted programs due to lack of computer skills to steal or destroy information on a computer
corprate spies
hired by companies to aquire software to gaINAN an advsntage in the business world
cyberextortionist
someone who uses email as a vehicle for extortion. use it as a threat to realase peronal info.
malware
computer virus. worm trojan horse rookit
payload
the end result of the event
trusted source
orgainzation or person you believe will not send you a virus
botnet
group fo compromised computers connected to a network.
zombie
compromised computer with an unaware owner that his computer is being comtrolled by some else
DoS attack
assault purpose to disrupt computer access to internet services.,/
back door attack
program allows users to bipass security controls.
spoofing
technique intruders use to make thir network appear legitmate to prople.
unauthorized use
use of a computer for unapproved illegal use.
unauthorizd access
use of a computer without permission
possessed object
item you must carry to gain access to a computer
digital forensics
dicovey of evidence found on a computer,
hardware theft
stealing of computer equiptment
hardware vandalism
act of defacing or destroying computer equiptment
software theft
stealing or reproducing software
license agreement
right to use the software. not own
information theft
stealing of personal information
encryption
process of converting readable data into unreadable charaters
decrypt
the deciphering of encryption text..
encryption algorithm
set of steps to convert readable plaintext into unreadable ciphertext
encryption key
formula that the creator of the data uses to encrypt the plaintext.
plaintext
readable data
ciphertext
unreadable data text on a computer
digital signature
encrypted code that a organization attaches to verify its identity..
digital certificate
noticce that gurantees a user or website legit
surge protector
special electircal compnents to provide a stable current flow to the computer.
UPS
device that contains surge protection circuts and batteries to provide power.
backup
duplicate of a file that can be used if file lost
restore
to put bakup files inplace of the original
war driving
individuals attempt to find wifi while driving their cars
RSI
injury diorder of the muscles nerves tondons joints
CVS
itchy eyes, unfocused, due to looking at screen for too long
Egronomics
applied science incorpersted comfort into workplace
computer addiction
comsumes entire social life is a growng problem
computer ethics
moral guidelines for computer use
National press photographers
against the manipulation of an y online image
intellectual property rights
rights to which creators are entitled for their work
cpoyright
gives authors and artists exclusive right to publish material. ,
grren computing
reducuing the amount fo electricity computers use.
information privacy
right of individuals and companies to deny collection of information reguarding them
cookie
small file that a web server stores on your computer. data about you
spyware
program ona computer that collects your personal information without your apprioved conesent.
adware
displays online advertisment
spam
unsolicited email sent to multiple addresses
phishing
spam wgere a intruder sends an official looking email mesage to gain peronal info
social engineering
gaining untohorized access to personal info by praying on the nieve human nature to trust
content filtering
process of restricitng access to certainj websites.
trusted source
orgainzation or person you believe will not send you a virus
botnet
group fo compromised computers connected to a network.
zombie
compromised computer with an unaware owner that his computer is being comtrolled by some else
DoS attack
assault purpose to disrupt computer access to internet services.,/
back door attack
program allows users to bipass security controls.
spoofing
technique intruders use to make thir network appear legitmate to prople.
unauthorized use
use of a computer for unapproved illegal use.
unauthorizd access
use of a computer without permission
possessed object
item you must carry to gain access to a computer
digital forensics
dicovey of evidence found on a computer,