• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back
the practice of talking a critical computer password out of an individual
Social Engineering-
Searching through the garbage for important pieces of information that can help crack an organization’s computers or be used to convince someone at he company to give access to the computers
Dumpster Diving-
a crime in which an imposter obtains key pieces of personal identification information, such as social security or driver’s license numbers, to impersonate someone else to obtain credit, merchandise, and services in the name of the victim or to provide the thief with false credentials
Identity theft-
a person who enjoys computer technology and spends time learning and using computer systems
Hacker-
a computer savvy person who attempts to gain unauthorized or illegal access to computer systems
Criminal hacker (cracker) -
a program that attaches itself to other programs
Virus-
an independent program that replicates is own program files until it interrupts the operation of networks and computer systems
Worm-
an application or system virus designed to “explode” or execute at a specified time and date
Logic bomb-
a program that appears to be useful but actually masks a destructive program
Trojan horse-
a small program hidden in a network or a computer system that records identification numbers and passwords
Password sniffer-
the act of illegally duplicating software
Software piracy-
illegally gaining access to and using the internet
Internet piracy-
a means to enable users of an insecure public networks such a the internet to securely and privately exchange data through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority
Public key infra-structure (PKI) –
the measurement of a living trait, whether physical or behavioral
Biometrics-
programs or utilities that prevent viruses and recover from them if they infect a computer
Antivirus programs-
security system that monitors IS and network resources and notifies security personnel when it senses a possible break-in
Intrusion detection system (IDS) –
an organization that monitors and maintains network security hardware and software for its client companies
Managed security service provider (MSSP) –
system to protect individuals from harmful or objectionable internet content while safeguarding the free-speech rights of others
ICRA rating system-
a screening technology that shields users from Web sites that don’t provides the level of privacy protection they desire
Platform for Privacy Preferences (P3P) –
an injury that can be caused by working with computer keyboards and other equipment
Repetitive motion disorder or repetitive stress injury (RSI) –
the aggravation of the pathway for nerves that travel through the wrist (the carpel tunnel)
Carpal tunnel syndrome (CTS) –
the study of designing and positioning computer equipment for employee health and safety
Ergonomics-