Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
24 Cards in this Set
- Front
- Back
audit trail
|
Computer file that records both successful and unsuccessful access attempts.
|
|
back door
|
Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
|
|
code of conduct
|
Written guidelines that helps determine whether a specific computer action is ethical or unethical.
|
|
computer crime
|
Any illegal act involving a computer.
|
|
computer ethics
|
Moral guidelines that govern the use of computers and information systems.
|
|
Copyright
|
Exclusive rights given to authors and artists to duplicate, publish, and sell their materials.
|
|
Cybercrime
|
Online or Internet-based illegal acts.
|
|
digital forensics
|
The discovery, collection, and analysis of evidence found on computers and networks. Also called computer forensics, network forensics, or cyberforensics.
|
|
denial of service attack
|
Assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. Also called DoS attack.
|
|
digital signature
|
Encrypted code that a person, Web site, or company attaches to an electronic message to verify the identity of the message sender.
|
|
employee monitoring
|
The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.
|
|
Encryption
|
Process of converting readable data into unreadable characters to prevent unauthorized access.
|
|
Hacker
|
Someone who accesses a computer or network illegally.
|
|
information privacy
|
Right of individuals and companies to deny or restrict the collection and use of information about them.
|
|
information theft
|
Computer security risk that occurs when someone steals personal or confidential information.
|
|
license agreement
|
An agreement issued by a software manufacturer that gives the user the right to use the software.
|
|
online security service
|
Web site that evaluates a computer to check for Internet and e-mail vulnerabilities.
|
|
Piracy
|
Unauthorized and illegal duplication of copyrighted material.
|
|
secure site
|
Web site that uses encryption techniques to secure its data.
|
|
Spam
|
Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once.
|
|
software theft
|
Computer security risk that occurs when someone (1) steals software media, (2) intentionally erases programs, or (3) illegally copies a program.
|
|
trusted source
|
Company or person a user believes will not send a virus-infected file knowingly.
|
|
unauthorized use
|
Use of a computer or its data for unapproved or possibly illegal activities.
|
|
Web filtering software
|
Program that restricts access to certain material on the Web.
|