Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
24 Cards in this Set
- Front
- Back
the practice of talking a critical computer password out of an individual
|
social engineering
|
|
searching through the garbage for important pieces of information that can help crack an organization's computers or be used to convince someone at the company to give access to the computers
|
dumpster diving
|
|
A crime in which an imposter obtains key pieces of personal identification information in order to impersonate someone else
|
idenity theft
|
|
a computer-savvy person who attempts to gain unauthorized or illegal access to computer systems
|
criminal hacker (cracker)
|
|
a program that attaches itself to other programs
|
virus
|
|
Functions as an independent program, replicating its own program files until it destroys other systems and programs or interrupts the operation of computer systems and networks
|
a worm
|
|
designed to "explode" or execute at a specified time and date
|
logic bomb
|
|
a program that appears to be useful but actually masks a destructive program
|
trojan horse
|
|
a small program hidden in a network or a computer system that records identification numbers and passwords
|
password sniffer
|
|
the act of illegally duplicating software
|
software piracy
|
|
Illegally gaining access to and using the internet
|
internet piracy
|
|
Provides another layer of protection in the event that an intruder gets past the outer security layers-passwords, security procedures and the corporate firewall
|
Intrusion detection system
|
|
These security opertaions monitor and maintain network security hardware and software
|
Managed security service providers
|
|
Enables users of an unsecure public network such as the Internet to securely and privately exchange data throught the use of a public and a prvate cryptographic key pair that is obtained and shared through a trusted authority
|
Public Key ingrastructure
|
|
the measurement of a living trait, whether it be physical or behavior
|
biometrics
|
|
Programs or utilities that prevent viruses and recover from them if they infect a computer
|
antivirus program
|
|
A system to prtect individuals from harmful or objectionable internet content while safeguarding the free-speech rights of others
|
ICRA rating system
|
|
The right to be left alone
|
Privacy Act of 1974
|
|
This act requires ISP's and telephone companies to turn over customer info without a court order if related to terrorism
|
USA Patriot Act
|
|
A screening technology that shields users from Web sites that don't provide the level of privacy protection they desire
|
P3P, Platform for Privacy Preferences
|
|
An injury that can be caused by working with computer keyboards and other equipment
|
Repetitive motion disorder
|
|
Included but not limited to tendonitis, tennis elbow, the inability to hold objects and sharp pain in fingers
|
Repetitive stress injury
|
|
the aggravation of the pathway for nerves that travel through the wrist
|
carpal tunnel syndrome
|
|
the study of designing and positioning computer equipment for employee health and safety
|
ergonomics
|