Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
72 Cards in this Set
- Front
- Back
any event or action that could cause a loss of or damage to compter hardware, software, data, information or processing capabitlity
|
Computer Security Risk
|
|
any illegal act involving a computer
|
Computer Crime
|
|
online or Internet-based Illegal acts
|
Cybercrime
|
|
computer ebtusiast, deragortary term to someone who accessing a computer or network illegally
|
Hacker
|
|
someone who accesses a computer or network illegally just has the intent of destroying data, stealing info, or other malicious action
|
Cracker
|
|
same intent as a cracker but does not have the technical skills and knowledge
|
Script Kiddle
|
|
Someone who uses e-mail as a vehicle for extortion.
|
cyberextortionist
|
|
hired to break into a certain computer and steal its propiertory data and information
|
coporate spies
|
|
Short for malicious software; programs that act without a user's knowledge and deliberately alter a computer's operations.
|
malware
|
|
Destructive event or prank a malicious-logic program is intended to deliver.
|
payload
|
|
Company or person a user believes will not send a virus-infected file knowingly.
|
trusted source
|
|
Group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes. See also zombie army.
|
botnet
|
|
A compromised computer whose owner is unaware the computer is being controlled remotely by an outsider.
|
zombie
|
|
Assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. Also called denial of service attack.
|
DoS attack
|
|
Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
|
back door
|
|
Technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
|
spoofing
|
|
Use of a computer or its data for unapproved or possibly illegal activities.
|
unauthorized use
|
|
use of a computer or network without permission.
|
unauthorized access
|
|
Completely Automated Public Turing test to tell Computers and Humans Apart; program used by some Web sites to provide further protection for a user's password by verifying that user input is not computer generated.
|
CAPTCHA
|
|
Any item that a user must carry to gain access to a computer or computer facility.
|
possessed object
|
|
Device that authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic.
|
biometric device
|
|
The discovery, collection, and analysis of evidence found on computers and networks.
|
digital forensics
|
|
The act of stealing computer equipment.
|
hardware theft
|
|
The act of defacing or destroying computer equipment.
|
hardware vandalism
|
|
Computer security risk that occurs when someone (1) steals software media, (2) intentionally erases programs, (3) illegally copies a program, or (4) illegally registers and/or activates a program.
|
software theft
|
|
An agreement issued by a software manufacturer that gives the user the right to use the software.
|
license agreement
|
|
Computer security risk that occurs when someone steals personal or confidential information.
|
information theft
|
|
Process of converting readable data into unreadable characters to prevent unauthorized access.
|
encryption
|
|
Process of deciphering encrypted data into a readable form.
|
decrypt
|
|
Set of steps that can convert readable plaintext into unreadable ciphertext.
|
encryption algorithm
|
|
Set of characters that the originator of the encrypted data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext
|
encryption key
|
|
Unencrypted, readable data.
|
plaintext
|
|
Encrypted (scrambled) data.
|
ciphertext
|
|
Encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender.
|
digital signature
|
|
A notice that guarantees a user or a Web site is legitimate.
|
digital certificate
|
|
Authorized person or company that issues and verifies digital certificates.
|
certificate authority (CA)
|
|
Prolonged malfunction of a computer.
|
system failure
|
|
Device that uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment.
|
surge protector
|
|
Device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.
|
uninterruptible power supply (UPS)
|
|
Duplicate or copy of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
|
backup
|
|
To copy backed up files by copying them to their original location on the computer.
|
restore
|
|
should be configured so that it does not broadcast a network name
|
WAP (Wireless access point)
|
|
Intrusion technique in which an individual attempts to detect wireless networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network.
|
war driving
|
|
Security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques.
|
Wi-Fi Protected Access (WPA)
|
|
Network standard that conforms to government's security standards and uses more sophisticated encryption techniques than WPA. Sometimes called WPA2.
|
802.11i
|
|
Injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
|
repetitive strain injury (RSI)
|
|
Eyestrain due to prolonged computer usage.
|
computer vision syndrome
|
|
The science of incorporating comfort, efficiency, and safety into the design of the workplace.
|
ergonomics
|
|
Growing health problem that occurs when the computer consumes someone's entire social life.
|
computer addiction
|
|
Moral guidelines that govern the use of computers and information systems.
|
computer ethics
|
|
group that completly oposses any manipulation of an image
|
National Press Photgraphers
|
|
Unique and original works such as ideas, inventions, art, writings, processes, company and product names, and logos.
|
intellectual property (IP)
|
|
Exclusive rights given to authors and artists to duplicate, publish, and sell their materials.
|
copyright
|
|
Computer usage that reduces the electricity and environmental waste involved in using a computer.
|
green computing
|
|
Program developed by the United States Department of Energy (DOE) and the United States Environmental Protection Agency (EPA) to help reduce the amount of electricity used by computers and related devices.
|
ENERGY STAR program
|
|
Right of individuals and companies to deny or restrict the collection and use of information about them.
|
information privacy
|
|
form that you have about you on a website database
|
Elecronic Profile
|
|
Small text file that a Web server stores on a computer.
|
cookie
|
|
Program placed on a computer without the user's knowledge that secretly collects information about the user.
|
spyware
|
|
Program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services.
|
adware
|
|
Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once.
|
spam
|
|
Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information.
|
phishing
|
|
Scam, similar to phishing, where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing.
|
pharming
|
|
Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
|
social engineering
|
|
The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.
|
employee monitoring
|
|
Process of restricting access to certain material on the Web.
|
content filtering
|
|
Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once.
|
spam
|
|
Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information.
|
phishing
|
|
Scam, similar to phishing, where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing.
|
pharming
|
|
Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
|
social engineering
|
|
The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.
|
employee monitoring
|
|
Process of restricting access to certain material on the Web.
|
content filtering
|