• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/39

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

39 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
Adware
software installed on a computer that produces pop up ads using your browser;the ads are often based on your browser habits
produces pop up ads
anti spyware software
software used to remove spyware and adware
remove spyware and adware
antivirus (Av) software
utility programs that prevent infection or scan a system to detect and remove viruses.
McAFee Associates and Norton Antivirus
ATA Secure Erase
(ANSI) standerd. dictates how to securely erase data from solid state drive (USB) or SSD drive in order to protect personal privacy
standard of erasing to protect personal privacy
biometric device
an input device that inputs biological data about a person;the data can identify a person's fingerprints, handprints, face, voice, eyes and handwriting
can identify you by fingerprint, face, Voice, eyes,handwriting
Bitlocker Encryption
A utility in Windows 7/Vista Ultimate and Enterprise editions that is used to lock down a hard drive by encrypting the entire Windows volume and and others on the drive
encryption lock down for Windows7/Vista
boot sector virus
An infectious program that can replace the boot program with a modified, infected version, often causing boot and data retrieval problems
virus that effects boot program,causes boot and data retrieval problems
computer infestation
unwanted program that is transmitted to a computer without the user knowledge
also called malicious software
degausser
a machine that exposes a storage device to a strong magnetic field to completely erase the data on a magnetic hard drive or tape drive
strong magnetic field to erase data
digital certificate
A code used to authenticate the source of a file or document or to identify and authenticate a person or organization sending data over a network. includes a public key for encryption. ( also called digital ID digital signature)
authenticate the source of a file, doc. person. or organization, includes public key
email hoax
An email message that is trying to tempt you to give out personal information or trying to scam you
a scam
Encrypted File System (EFS)
A way to use a key to encode a file or folder on a NTFS volume to protect sensitive data. Because it's a integrated system service EFS is transparent to users and applications
uses a key to encode a file or folder on NTFS volume to protect, transports to users and applications
grayware
A program that AV software recognizes to be potentially unwanted or potential harmful
could be potentially unwanted or harmful
malicious software
Any unwanted program that is transmitted to a computer without the users knowledge and is designed to data and software. Types of of infestation include viruses, Trojan horses,worms, adware, spyware, keyloggers, browser hijackers, dialers and downloadeds.
unwanted programs that are transmitted to your computer without your knowledge
keylogger
A type of spyware that tracks your keystrokes,including password, chat room sessions, email messages,documents, online purchases, and anything else you type on your PC. Text is logged to a text file and transmitted over the internet without your knowledge
spyware that tracks your privacy through your keystrokes and is transmitted over the internet without your knowledge
phishing (1)
(1) A type of identity theft where a person is baited into giving personal data to a website of a reputable company with which the person has an account
baited into giving personal data to a website of a reputable company that you have an account with
Phishing (2)
(2) sending an email message with the intent of getting the user to reveal private information that can be used for identity theft
sending a email to bait user to reveal private information
privacy filter
A device that fits over a monitor screen to prevent other people from viewing the monitor from a web angle
fits over monitor screen to prevent people from viewing the monitor from a web angle
quarantined computer
A computer that is suspected of infection and is not allowed to use the network, is put on a different network dedicated to quarantined computers, or is only allowed to access only certain network resources
computer suspected of infection, not allowed in the network, or only allowed certain network resources
retinal scanning
part of the authentication process, some systems use biometric data by scanning the blood vessels behind the eye and considered the most reliable of all biometric data scanning
part of the authentication process, scan eyes, most reliable
RFID badge
a badge worn by an employee used to gain entrance into a locked area of a building. A Radio Frequency Identification token transmite authentication to the system when the token gets in range of quary device
a badge that gives employees entrance to a locked area in a building. Uses a Radio frequency identification token to the system when token is in range
Rootkit
A type of malicious software that load itself before the OS boot is complete and can hijack internal Windows component so that it masks information that Windows provides to usermode utilities such as Windows Explorer or task manager
malicious software that loads before Os boots and can hijack internal windows components, masks information such as Windows Explorer or task manager
RSA tokens
A type of smart card that contains authentication information
used in smart card
Security center
a center in vista where you can confirm Windows Firewall, Windows update, anti-malware settings, includes that of Windows defender, and other security settings
in vista, confirms Windows firewall and updates, Windows Defender, anti-malware and security settings
shoulder surfing
where other people secretly peek at your monitor as you work to gain valuable information
people secretly peek at your monitor as your working to gain information
smart card
any device that contains authentication information that can be keyed into a logon window to read by a reader to authenticate a user on a network
can be keyed into a logon window or read by a reader to authenticate user in the network
smart card Reader
a device that can read a smart card used to authenticate a person on a network
device that can read smart to authenticate user on a network
spyware
malicious software that installs itself on your computer to spy on you. It collects personal information about you and it transmits over the internet to web hosting sites that intend to use your personal data for harm
malicious software that spys on you and sends your personal information to web hosting sites that harm you
social engineering
The practice of tricking people into giving out personal information or allowing unsafe programs into the network or computer
practice of tricking people
strong password
a password that isn't easy to guess
hard to guess it
tailgating
When someone who is unauthorized follow the employee through a secure area or room or building
following an employee to gain entrance to secure area or room
Trojan
a type of malware that tricks you into opening it by substituting itself for a legitimate program
malware that tricks you, substituting itself for a legitimate program
virus
a program that often has an incubation period, is infectious and is intended to cause damage. A virus program might destroy data and program might or damage a disk drive boot sector
has an incubation period, infectious, might destroy data and program or disk drive sector
virus definition
a set of characteristics of a virus and is used by antivirus software to identify new viruses as they get into the wild
antivirus software uses virus characteristics to stop virus add they get out
Virus signature
refer to virus definition
think virus definition
virus signature
refer to virus definition
think virus definition
Windows Defender
antispyware utility included in Windows 7/Vista
used in only 7/vista, antispyware
Windows Firewall
A personal firewall that protects a computer from invasion and is automatically configured when you set your network location.
a personal firewall that protects computer from invasion , automatically configured, in the Network and sharing center
Worm
An infestation design to copy itself repeatedly to memory, on drive space, or on a network, until little memory, disk space or network bandwidth remains
infestation that copy itself repeatedly on memory , Drive space or on a network till none remains