Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
64 Cards in this Set
- Front
- Back
Acceptable use policy (AUP)
|
A policy that a user must agree to follow in order to be provided access to a network or to the Internet.
|
|
Adware
|
Software that generates ads that install themselves on a computer when a person downloads some other program from the internet.
|
|
Anti-spam policy
|
States that e-mail users will not send unsolicited e-mails (or spam).
|
|
Authentication
|
A method for confirming users' identities.
|
|
Authorization
|
The process of giving someone permission to do or have something.
|
|
Backdoor program
|
Viruses that open a way into the network for future attacks.
|
|
Biometrics
|
The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.
|
|
Black-hat hacker
|
Breaks into other people's computer systems and may just look around or steal and destroy information
|
|
Clickstream
|
Records information about a customer during a Web surfing session such as what Web sites were visited, how long the visit was, what ads were viewed, and what was purchased.
|
|
Confidentiality
|
The assurance that messagse and information are available only to those who are authorized to view them.
|
|
Content filtering
|
Occurs when organizations use software that filters content to prevent the transmission of unauthorized information.
|
|
Cookie
|
A small file deposited on a hard drive by a Web site containing information about customers and their Web activities
|
|
Copyright
|
The legal protection afforded an expression of an idea, such as a song, video game, and some types of proprietary documents.
|
|
Counterfeit software
|
Software that is manufactured to look like the real thing and sold as such.
|
|
Cracker
|
A hacker with criminal intent.
|
|
Cyberterrorist
|
Seeks to cause harm to people or to destroy critical systems or information nand use the Internet as a weapon of mass destruction.
|
|
Denial-of-service attack (DoS)
|
Floods a Web site with so many requests for service that it slows down or crashes the site.
|
|
Distributed denial-of-serive attack (DDoS)
|
Attacks from multiple computers that flood a Web site with so many requests for service that it slows down or crashes
|
|
Elevation of privelege
|
Process by which a user misleads a system into granting unauthorized rights, usually for the purpose of compromising or destroying the system.
|
|
E-mail privacy policy
|
Details the extent to which e-mail messages may be read by others.
|
|
Cyberterrorist
|
Seeks to cause harm to people or to destroy critical systems or information nand use the Internet as a weapon of mass destruction.
|
|
Encryption
|
Scrambles information into an alternative form that requires a key or password to decrypt the information.
|
|
ePolicies
|
Policies and procedures that address the ethical use of computer and Internet usage in the business environment.
|
|
Ethical computer use policy
|
Contains general principles to guide computer user behavior.
|
|
Ethics
|
Principles and standards that guide our behavior toward other people.
|
|
Fair use doctrine
|
In certain situations, it is legal to use copyrighted material.
|
|
Firewall
|
Hardware and/or software that guards a private network by analyzing the information leaving and entering the network.
|
|
Hacker
|
People very knowledgeable about computers who use their knowledge to invade other people's computers.
|
|
Hactivist
|
Person with philosophical and political reasons for breaking into systesm and will often deface the Web site as a protest.
|
|
Hardware key logger
|
A hardware device that captures keystrokes on their journey from the keyboard to the motherboard.
|
|
Hoaxes
|
Attack computer systems by transmitting a virus hoax, with a real virus attached.
|
|
Identity theft
|
The forging of someone's identity for the purpose of fraud.
|
|
Information privacy policy
|
Contains general principles regarding information privacy.
|
|
Information security
|
A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.
|
|
Information security plan
|
Details how an organization will implement the information security policies.
|
|
Information security policies
|
Identifies the rules required to maintain information security.
|
|
Information technology monitoring
|
Tracking people's activities by such measures as number of keystrokes, error rate, and number of transactions processed.
|
|
Insider
|
Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.
|
|
Intellectual property
|
Intangible creative work that is embodied in physical form.
|
|
Internet use policy
|
Contains general principles to guide the proper use of the internet.
|
|
Intrusion detection software (IDS)
|
Searches out patterns in information and network traffic to indicate attacks and quickly responds to prevent any harm.
|
|
Key logger software (key trapper)
|
A program that, when installed on a computer, records every keystroke and mouse click
|
|
Mail bomb
|
Sends a massive amount of e-mail to a specific person or system resulting in filling up the recipient's disk space, which, in some cases, may be too much for the server to handle and may cause the server to stop functioning.
|
|
Malicious code
|
Includes a variety of threats such as viruses, worms, and Trojan horses.
|
|
Nonrepudiation
|
A contractual stipulation to ensure that e-business participants do not deny (repudiate) their online actions.
|
|
Packet tampering
|
Altering the contents of packets as they travel over the Internet or altering data on computer disks after penetrating a network.
|
|
Phishing
|
Technique to gain personal information for the purpose of identity theft, usually by means of fraudulent e-mail.
|
|
Pirated software
|
The unauthorized use, duplication, distribution, or sale of copyrighted software.
|
|
Polymorphic virus and worm
|
Change their form as they propagate.
|
|
Privacy
|
The right to be left alone when you want to be, to have control over your own personal possessions, and not to be observed without your consent.
|
|
Public key encryption (PKE)
|
Encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient.
|
|
Script kiddies or script bunnies
|
Find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.
|
|
Smart card
|
A device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing.
|
|
Sniffer
|
A program or device that can monitor data traveling over a network.
|
|
Social engineering
|
Using one's social skills to trick people into revealing access credentials or other information valuable to the attacker.
|
|
Spam
|
Unsolicited e-mail.
|
|
Spoofing
|
The forging of the return address on an e-mail so that the e-mail message appears to come from someone other than the actual sender.
|
|
Spyware (sneakware or stealthware)
|
Software that come shidden in free downloadable software and tracks online movements, mines the information stored on a computer, or uses a computer's CPU and storage for some task the user knows nothing about.
|
|
Token
|
Small electronic devices that change user passwords automatically.
|
|
Trojan-horse virus
|
Hides inside other software, usually an attachment or a downloadable file.
|
|
Virus
|
Software written with malicious intent to cause annoyance or damage.
|
|
Web log
|
Consists of one line of information for every visitor to a Web site and is usually stored on a Web server.
|
|
White-hat hacker
|
Works at the request of the system owners tofind system vulnerabilities and plug the holes.
|
|
Worm
|
A type of virus that spreads itself, not only from file to file, but also from computer to computer.
|