• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/29

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

29 Cards in this Set

  • Front
  • Back
spyware
software that secretly gathers information about users while they browse the web.
adware
is a form of spyware that collects information about the user(without the user's consent) to display advertisements in the web browser, based on information it collects from the user's browsing patterns
phishing
sending fraudulent emails that seem to come from legitimate source, such as a bank or university.....
keyloggers
monitor and record keystrokes and can be software or hardware devices.
cookies
small test files with a unique ID tag that are embedded in a web browser and saved on the user's hard drive
sniffing
capturing and recording network traffic, it can be done for legitimate reasons, but hackers use it to intercept infro...
spoofing
attempt to gain access to a network by posing as an authorized user to find sensitive info....
acceptable use policy
a set of rules specifying legal and ethical system use and activities and the consequences of noncompliance
spam
unsolicited email sent for advertising purposes.
cybersquatting
registering, selling, or using a domain name to profit from someone else's trademark
digital divide
computers still aren't affordable for many people.
virtual organizations
networks of independent companies, suppliers, customers, and manufacturers connected via info..tech..
confidentiality
system must not allow disclosing info. to anyone who isn't authorized to access it.
integrity
ensures the accuracy of info. resources in an organization
availability
ensures that computers and networks are operating, and authorized users can access the info..
fault tolerant systems
ensures availability in case of a system failure by using a combination of hardware and software.
Trojan program
contains code intended to disrubt a computer, network, or website and is usually hidden inside popular program.
backdoor (trap door)
a programing routing built into a system by its designer. it enables the designer to bypass system security
biometric security measures
use a physiological element to enhance security measures. these elements r unique to a person....
multiplexer
a hardware device that allows several nodes to share one communication channel.
centralized processing
system, all processing is done at one central computer
decentralized processing
each user, department has its own computer
distributed processing
maintains centralized control and decentralizes operations. processing power is distributed among several locations
virus
consists of self propagating program code that's triggered by a specified time or event...
denial of service attack
floods a network or server with service requests to prevent legitimate user's access t the system..
bandwidth
the amount of data that can be transferred from one point to another in a certain time period, usually one second.
broadband
data transmission, multiple pieces of data are sent simultaneously to increase the transmission rate.
LAN-local area network
connects workstations and peripheral devices that are in close proximity
WAN-wide area network
can span several cities, states, or even countries, and it's usually owned by several different parties