Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
Biometric security measures
|
security tools that use a fingerprint, voice pattern, or the iris or retina of the eye to indentify a person
|
|
computer crime
|
a criminal act that is committed through a computer, like getting into someone else's system and changing information or creating a computer virus and causing it to damage information on others' computers
|
|
Computer Fraud
|
Conduct that involves the manipulation of a computer or computer data in order to dishonestly obtain money, property, or value or to cause loss
|
|
Data diddling
|
act of changing data before it is entered in the computer or after it has been entered
|
|
Hacking
|
act of invading someone else's computer, usually for personal gain or just the satisfaction of being able to do it
|
|
time bomb
|
computer virus thta does not cause its damage until a certain date or until the system has been booted a certain number of times
|
|
logic bomb
|
computer virus that is triggered by the apperance or disapperance of specified data
|
|
trojan horse
|
computer virus that does something different from what it is expected to do
|
|
virus
|
computer program that's written to cause corruption of data
|
|
worm
|
type of computer virus that makes many copies of itself resulting in the consumption of system resources, thus slowing down or actually halting tasks
|