Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
22 Cards in this Set
- Front
- Back
antispyware
|
Software that searches a computer for spyware and other software that may violate a user’s privacy, allows the user to remove it, and provides continuing protection against future attacks.
|
|
antivirus software
|
Uses several techniques to find viruses on a computer system, remove them if possible, and keep additional viruses from infecting the system.
|
|
biometrics
|
The science and technology of authentication by scanning and measuring a person’s unique physical features such as fingerprints, retinal patterns, and facial characteristics.
|
|
computer forensics
|
The process of examining computing equipment to determine if it has been used for illegal, unauthorized, or unusual activities.
|
|
cyberterrorism
|
A form of terrorism that uses attacks over the Internet to intimidate and harm a population.
|
|
firewall
|
Network hardware or software that examines all incoming packets and filters out packets that are potentially dangerous.
|
|
identity theft
|
The criminal act of using stolen information about a person to assume that person’s identity.
|
|
intellectual property
|
A product of the mind or intellect over which the owner holds legal entitlement.
|
|
intellectual property rights
|
Rights relative to the ownership and use of intellectual property such as software, music, movies, data, and information.
|
|
Internet fraud
|
The crime of deliberately deceiving a person over the Internet in order to cause damage and to unjustly obtain property or services from the victim.
|
|
password
|
A combination of characters known only to the user that is used for authentication.
|
|
phishing
|
Scam that combines spoofed e-mail and a spoofed Web site in order to trick a person into providing private information.
|
|
piracy
|
The illegal copying, use, and distribution of digital intellectual property such as software, music, and movies.
|
|
plagiarism
|
Taking credit for someone else’s intellectual property, typically a written idea, by claiming it as your own.
|
|
security holes
|
Software bugs that allow violations of information security.
|
|
software patches
|
Corrections to the software bugs that cause security holes.
|
|
spyware
|
Software installed on a computer without the user’s knowledge to either monitor the user or allow an outside party to control the computer.
|
|
username
|
Identifies a user to the computer system.
|
|
virus
|
A program that attaches itself to a file, spreads to other files, and delivers a destructive action called a payload.
|
|
virus hoax
|
An e-mail that warns of a virus that doesn’t exist.
|
|
worm
|
A program that does not attach itself to other programs but rather acts as a free agent, replicating itself numerous times in an effort to overwhelm systems.
|
|
zombie computer
|
A computer that carries out actions (often malicious) under the remote control of a hacker either directly or through spyware or a virus.
|