• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back

Hardware Problems

Breakdowns, configuration errors, damage from improper use or crime

Software Problems

Programming errors, installation errors, unauthorized changes

Wireless Security Challenges

Radio frequencies are easy to scan

Viruses

Rogue software program that attaches itself to other software programs or data files in order to be executed

Worms

Independent computer programs that copy themselves from one computer to other computers over a network

Trojan horse

Software program that appears to be benign but then does something other than expected

Spyware

Small programs that install themselves on computers to monitor user web surfing and serve up advertising

Key loggers

Record every keystroke on computer to steal serial numbers, passwords, launch internet attacks

Identity Theft

Theft of personal information to impersonate someone else

Phishing

Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data

Pharming

Redirects users to a bogus web page, even when the individual types correct web page address into browser

Patches

small pieces of software to repair flaws released by vendors

Firewall

Combination of hardware and software that prevents unauthorized access to network