Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
biometric security measures
|
security tools that use a fingerprint voice pattern ect, to identify a person
|
|
computer crime
|
a criminal act that is committed through the use of a computer, like idenitfy theft or virus
|
|
computer fraud
|
conduct that involes the manipulation of a computer or computer data in order to dishonestly obtain money property or value or to cause loss
|
|
data diddling
|
act of changing data before it is entered in the computer or after it has been entered
|
|
hacking
|
act of invading someone else's computer usually for personal gain or just the satisfaction of being able to do it
|
|
logic bomb
|
computer virus that is triggered by the appearance or disappereance of specficd data
|
|
time bomb
|
computer virus that does not cause damage until a certain date or until the system has been booted a certain number of times
|
|
trojan horse
|
computer virus that does something different from what it is expected to do
|
|
virus
|
computer program that written to cause corruption of data
|
|
worm
|
type of computer virus that makes many copies of itself in the consumption of system resources thus slowing down or actually halting tasks
|