Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
10 Cards in this Set
- Front
- Back
Security tools that use a fingerprint, voice pattern, or the iris or retina of the eye to identify a person
|
Biometric security measures
|
|
A criminal act that is commited through the use of a computer, like getting into someone else's system and changing information or creating a computer virus and causing it do damage information on others' computers
|
Computer crime
|
|
Conduct that involves the manipulation of a computer or computer data in order to dishonestly obtain money, property, or value or to cause loss
|
Computer fraud
|
|
Act of changing data before it is entered in the computer or after it has been entered
|
Data diddling
|
|
Act of invading someone else's computer, usually for personal gain or just the satisfaction of being able to do it
|
Hacking
|
|
Computer virus that is triggered by the appearance or disappearance of specified data
|
Logic bomb
|
|
Computer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times
|
Time bomb
|
|
Comptuer virus that that does somethign different from what it is expected to do
|
Trojan horse
|
|
Computer program that's written to cuase corruption of data
|
Virus
|
|
Type of computer that makes many copies of itself resulting in the consumption of system resources, thus slowing down or actually halting taks.
|
Worm
|