• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/22

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

22 Cards in this Set

  • Front
  • Back
Computer Security Risk
An event or action that could cause a loss of or damage to computer hard ware, software, data, information, or processing capability
computer Crime
Illegal act involving a computer.
Cybercrime
online-internet based illegal acts
Hacker
someone who accesses a computer or network illegally
Cracker
Someone who accesses a computer or network illegally with the intent of destroying data and stealing information
Script Kiddie
Same intent as a cracker without the technical skills and knowledge
Corporate Spies
Excellent computer and networking skills, hired to break in to computers and steal info and data
Cyberextortionist
Someone who uses email as a vehicle for extortion
Malware
Malicious Software
Programs that act without a users knowledge and deliberately alter computer's operation
Payload
destructive event or prank the program is intended to deliver
Trusted Source
Organization or person you believe will not send a virus infected file knowingly
Botnet
group of compromised computers connected to a network such as the internet that are used as part of a network that attacks other networks
Zombie
Compromised computer, where owner is unaware computer is controlled by outsider
DoS Attack
Denial of service attack
Assault, purpose to disrupt computer access to an internet service
Back Door
Program or set of instructions in a program that allow users to bypass security controls when accessing a program
Spoofing
Technique intruders use to make their network or Internet transmissions look legitimate
Unauthorized Use
Use of computer or its data for unapproved or possibly illegal activities
Unauthorized Access
Use of computer or network without permission
CAPTCHA
Completely Automated Public Turing test to tell computers and Humans apart
Program that verifies user input is not computer generated
Possessed Object
Item you must carry to gain access to a computer or computer facility
Biometric Device
authenticates a person's identity by translating a personal characteristic.
Digital Forensics
Discovery, collection and analysis on evidence found on computers and network