Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
22 Cards in this Set
- Front
- Back
Computer Security Risk
|
An event or action that could cause a loss of or damage to computer hard ware, software, data, information, or processing capability
|
|
computer Crime
|
Illegal act involving a computer.
|
|
Cybercrime
|
online-internet based illegal acts
|
|
Hacker
|
someone who accesses a computer or network illegally
|
|
Cracker
|
Someone who accesses a computer or network illegally with the intent of destroying data and stealing information
|
|
Script Kiddie
|
Same intent as a cracker without the technical skills and knowledge
|
|
Corporate Spies
|
Excellent computer and networking skills, hired to break in to computers and steal info and data
|
|
Cyberextortionist
|
Someone who uses email as a vehicle for extortion
|
|
Malware
|
Malicious Software
Programs that act without a users knowledge and deliberately alter computer's operation |
|
Payload
|
destructive event or prank the program is intended to deliver
|
|
Trusted Source
|
Organization or person you believe will not send a virus infected file knowingly
|
|
Botnet
|
group of compromised computers connected to a network such as the internet that are used as part of a network that attacks other networks
|
|
Zombie
|
Compromised computer, where owner is unaware computer is controlled by outsider
|
|
DoS Attack
|
Denial of service attack
Assault, purpose to disrupt computer access to an internet service |
|
Back Door
|
Program or set of instructions in a program that allow users to bypass security controls when accessing a program
|
|
Spoofing
|
Technique intruders use to make their network or Internet transmissions look legitimate
|
|
Unauthorized Use
|
Use of computer or its data for unapproved or possibly illegal activities
|
|
Unauthorized Access
|
Use of computer or network without permission
|
|
CAPTCHA
|
Completely Automated Public Turing test to tell computers and Humans apart
Program that verifies user input is not computer generated |
|
Possessed Object
|
Item you must carry to gain access to a computer or computer facility
|
|
Biometric Device
|
authenticates a person's identity by translating a personal characteristic.
|
|
Digital Forensics
|
Discovery, collection and analysis on evidence found on computers and network
|