Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
36 Cards in this Set
- Front
- Back
Any event or action that could cause a loss of or damage to computer hardware, software data, etc.
|
Computer Security Risk
|
|
illegal act involving a computer
|
Computer Crime
|
|
online or Internet-based illegal acts
|
Cybercrime
|
|
someone who accesses a computer or netward illegally
|
Hacker
|
|
someomne who accesses a computer or network illegally but has the intent of destroying data, stealing info, etc
|
Cracker
|
|
Intent of destroying data, stealing info, etc. but lacks technical skills and knowledge
|
Script Kiddie
|
|
Hired to break into a specific computer and steal its data and information
|
Corporate Spies
|
|
someone who uses e-mail as a vehicle for extortion
|
Cyberextortionist
|
|
programs that act without a users knowledge and alter the computers operations
|
Malware (malicious software)
|
|
destructive event or prank the program is intended to deliver
|
Payload
|
|
organization or person you believe will not send a virus infected file knowingly
|
Trusted Source
|
|
group of compromised computers connected to a network that are used as part of a network that attacks other networks
|
Botnet
|
|
compromised computer, owner is unaware the computer access to an Internet Source
|
Zombie
|
|
assault whose purpose is to disrupt computer access to an Internet service
|
DoS Attack (Denial of Service attack)
|
|
program that allows users to bypass security controls when accessing a program, computer or network
|
Back Door
|
|
technique intruders use to make their network appear legitamite to a victim, computer or network
|
Spoofing
|
|
use of a computer for unapproved or possibly illegal activities
|
Unauthorized Use
|
|
use of a computer or network without permission
|
Unauthorized Access
|
|
program that verifies user input is not computer generated
|
CAPTCHA (Completely Automated Public Turing tes to tell Computer and Humans Apart)
|
|
any item that you must carry to gain access to a computer or computer facility
|
Possessed Object
|
|
organization or person you believe will not send a virus infected file knowingly
|
Trusted Source
|
|
group of compromised computers connected to a network that are used as part of a network that attacks other networks
|
Botnet
|
|
compromised computer, owner is unaware the computer access to an Internet Source
|
Zombie
|
|
assault whose purpose is to disrupt computer access to an Internet service
|
DoS Attack (Denial of Service attack)
|
|
program that allows users to bypass security controls when accessing a program, computer or network
|
Back Door
|
|
technique intruders use to make their network appear legitamite to a victim, computer or network
|
Spoofing
|
|
use of a computer for unapproved or possibly illegal activities
|
Unauthorized Use
|
|
use of a computer or network without permission
|
Unauthorized Access
|
|
program that verifies user input is not computer generated
|
CAPTCHA (Completely Automated Public Turing tes to tell Computer and Humans Apart)
|
|
any item that you must carry to gain access to a computer or computer facility
|
Possessed Object
|
|
Authenticates a person's identity by translating a personal characteristic
|
Biometric Device
|
|
Discovery, collection, and analysis of evidence found on computers and networks
|
Digital Forensics, Computer Forensics, Cyberforensics
|
|
Potentially damaging program that negatively affects a computer, spreads throughout the computer.
|
Virus
|
|
Copies itself repeatedly using up resources.
|
Worm
|
|
Hides within or looks like a legitimate program, a certain condition or action triggers it.
|
Trojan Horse
|
|
Program that hides in a computer and allows someone from a remote location to take full control of the computer.
|
Rootkit
|