• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/64

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

64 Cards in this Set

  • Front
  • Back
Acceptable use policy (AUP)
A policy that a user must agree to follow in order to be provided access to a network or to the Internet.
Adware
Software that generates ads that install themselves on a computer when a person downloads some other program from the internet.
Anti-spam policy
States that e-mail users will not send unsolicited e-mails (or spam).
Authentication
A method for confirming users' identities.
Authorization
The process of giving someone permission to do or have something.
Backdoor program
Viruses that open a way into the network for future attacks.
Biometrics
The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.
Black-hat hacker
Breaks into other people's computer systems and may just look around or steal and destroy information
Clickstream
Records information about a customer during a Web surfing session such as what Web sites were visited, how long the visit was, what ads were viewed, and what was purchased.
Confidentiality
The assurance that messagse and information are available only to those who are authorized to view them.
Content filtering
Occurs when organizations use software that filters content to prevent the transmission of unauthorized information.
Cookie
A small file deposited on a hard drive by a Web site containing information about customers and their Web activities
Copyright
The legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents.
Counterfeit software
Software that is manufactured to look like the real thing and sold as such.
Cracker
A hacker with criminal intent.
Cyberterrorist
Seeks to cause harm to people or to destroy critical systems or information nand use the Internet as a weapon of mass destruction.
Denial-of-service attack (DoS)
Floods a Web site with so many requests for service that it slows down or crashes the site.
Distributed denial-of-serive attack (DDoS)
Attacks from multiple computers that flood a Web site with so many requests for service that it slows down or crashes
Elevation of privelege
Process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system.
E-mail privacy policy
Details the extent to which e-mail messages may be read by others.
Cyberterrorist
Seeks to cause harm to people or to destroy critical systems or information nand use the Internet as a weapon of mass destruction.
Encryption
Scrambles information into an alternative form that requires a key or password to decrypt the information.
ePolicies
Policies and procedures that address the ethical use of computer and Internet usage in the business environment.
Ethical computer use policy
Contains general principles to guide computer user behavior.
Ethics
Principles and standards that guide our behavior toward other people.
Fair use doctrine
In certain situations, it is legal to use copyrighted material.
Firewall
Hardware and/or software that guards a private network by analyzing the information leaving and entering the network.
Hacker
People very knowledgeable about computers who use their knowledge to invade other people's computers.
Hactivist
Person with philosophical and political reasons for breaking into systesm and will often deface the Web site as a protest.
Hardware key logger
A hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
Hoaxes
Attack computer systems by transmitting a virus hoax, with a real virus attached.
Identity theft
The forging of someone's identity for the purpose of fraud.
Information privacy policy
Contains general principles regarding information privacy.
Information security
A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
Information security plan
Details how an organization will implement the information security policies.
Information security policies
Identifies the rules required to maintain information security.
Information technology monitoring
Tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
Insider
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
Intellectual property
Intangible creative work that is embodied in physical form.
Internet use policy
Contains general principles to guide the proper use of the internet.
Intrusion detection software (IDS)
Searches out patterns in information and network traffic to indicate attacks and quickly responds to prevent any harm.
Key logger software (key trapper)
A program that, when installed on a computer, records every keystroke and mouse click
Mail bomb
Sends a massive amount of e-mail to a specific person or system resulting in filling up the recipient's disk space, which, in some cases, may be too much for the server to handle and may cause the server to stop functioning.
Malicious code
Includes a variety of threats such as viruses, worms, and Trojan horses.
Nonrepudiation
A contractual stipulation to ensure that e-business participants do not deny (repudiate) their online actions.
Packet tampering
Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network.
Phishing
Technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
Pirated software
The unauthorized use, duplication, distribution, or sale of copyrighted software.
Polymorphic virus and worm
Change their form as they propagate.
Privacy
The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
Public key encryption (PKE)
Encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient.
Script kiddies or script bunnies
Find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
Smart card
A device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing.
Sniffer
A program or device that can monitor data traveling over a network.
Social engineering
Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker.
Spam
Unsolicited e-mail.
Spoofing
The forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender.
Spyware (sneakware or stealthware)
Software that come shidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about.
Token
Small electronic devices that change user passwords automatically.
Trojan-horse virus
Hides inside other software, usually an attachment or a downloadable file.
Virus
Software written with malicious intent to cause annoyance or damage.
Web log
Consists of one line of information for every visitor to a Web site and is usually stored on a Web server.
White-hat hacker
Works at the request of the system owners tofind system vulnerabilities and plug the holes.
Worm
A type of virus that spreads itself, not only from file to file, but also from computer to computer.