• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/36

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

36 Cards in this Set

  • Front
  • Back
Any event or action that could cause a loss of or damage to computer hardware, software data, etc.
Computer Security Risk
illegal act involving a computer
Computer Crime
online or Internet-based illegal acts
Cybercrime
someone who accesses a computer or netward illegally
Hacker
someomne who accesses a computer or network illegally but has the intent of destroying data, stealing info, etc
Cracker
Intent of destroying data, stealing info, etc. but lacks technical skills and knowledge
Script Kiddie
Hired to break into a specific computer and steal its data and information
Corporate Spies
someone who uses e-mail as a vehicle for extortion
Cyberextortionist
programs that act without a users knowledge and alter the computers operations
Malware (malicious software)
destructive event or prank the program is intended to deliver
Payload
organization or person you believe will not send a virus infected file knowingly
Trusted Source
group of compromised computers connected to a network that are used as part of a network that attacks other networks
Botnet
compromised computer, owner is unaware the computer access to an Internet Source
Zombie
assault whose purpose is to disrupt computer access to an Internet service
DoS Attack (Denial of Service attack)
program that allows users to bypass security controls when accessing a program, computer or network
Back Door
technique intruders use to make their network appear legitamite to a victim, computer or network
Spoofing
use of a computer for unapproved or possibly illegal activities
Unauthorized Use
use of a computer or network without permission
Unauthorized Access
program that verifies user input is not computer generated
CAPTCHA (Completely Automated Public Turing tes to tell Computer and Humans Apart)
any item that you must carry to gain access to a computer or computer facility
Possessed Object
organization or person you believe will not send a virus infected file knowingly
Trusted Source
group of compromised computers connected to a network that are used as part of a network that attacks other networks
Botnet
compromised computer, owner is unaware the computer access to an Internet Source
Zombie
assault whose purpose is to disrupt computer access to an Internet service
DoS Attack (Denial of Service attack)
program that allows users to bypass security controls when accessing a program, computer or network
Back Door
technique intruders use to make their network appear legitamite to a victim, computer or network
Spoofing
use of a computer for unapproved or possibly illegal activities
Unauthorized Use
use of a computer or network without permission
Unauthorized Access
program that verifies user input is not computer generated
CAPTCHA (Completely Automated Public Turing tes to tell Computer and Humans Apart)
any item that you must carry to gain access to a computer or computer facility
Possessed Object
Authenticates a person's identity by translating a personal characteristic
Biometric Device
Discovery, collection, and analysis of evidence found on computers and networks
Digital Forensics, Computer Forensics, Cyberforensics
Potentially damaging program that negatively affects a computer, spreads throughout the computer.
Virus
Copies itself repeatedly using up resources.
Worm
Hides within or looks like a legitimate program, a certain condition or action triggers it.
Trojan Horse
Program that hides in a computer and allows someone from a remote location to take full control of the computer.
Rootkit