Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
65 Cards in this Set
- Front
- Back
Computer Security Risk
|
any event or action that could cause a lot damage to computer hardware, software, data, info., or processing cabablity
|
|
Computer Crime
|
any illegal act involving a computer
|
|
Cybercrime
|
online/ internet based illegal acts
|
|
Hacker
|
someone who accesses a computer network illegally
|
|
Cracker
|
someone who accesses a computer network illegally but has bad intents
|
|
Script Kiddie
|
someone with the same intent as a cracker but doesn't have the technical skills
|
|
Corporate spies
|
people hired to break into computers and stealm data
|
|
Cyberterorist
|
someone who uses e-mail as a vechicle for extortion
|
|
Malware(malisious software)
|
programs that act and alter the computer with out the users knowledge
|
|
Payload
|
the destructive event or prank a program is intended to deliver
|
|
Bonet
|
a group of comprosed computers that uses a part of a network that attacks other networks
|
|
Zombie
|
one whose owner is unaware the computer is being controlled by an outsider
|
|
DoS attack(denile of service)
|
an assault whose purpose is to disrupt computer access to an Internet service
|
|
back door
|
a program that allows a users to bypass a security control on a program
|
|
Spoofing
|
a technique intruders use to make their network look real to a victim
|
|
CAPTCHA
|
Completely Automated Public Testing test to tell Computer and Humans Apart,verifies a user is real
|
|
Hardware Theft
|
the act of stealing a computer equipment
|
|
Hardware vandalism
|
the act of defacing or defacing or destroying computer equipment
|
|
Software theft
|
occurs when someone steals software media, earses a program, copies a program, or activates a program
|
|
Licence agreement
|
the right to use the software
|
|
Information theft
|
occurs when someone steals personal or confidential information
|
|
Encyrption
|
the process of converting readable data into unreadable characters
|
|
Decyrpt
|
to decipher something
|
|
Digital signature
|
an encyption code that some attaches to a electronic message to verify it's the person
|
|
System faliure
|
the prolonged malfuction of a computer
|
|
War driving
|
attepting to detect wireless networks from a mobie device while driving
|
|
Wi-Fi protected Access(WPA)
|
a security standard that improves on older security standards by authenicating network
|
|
802.11 or WPA2
|
the most recent network security standard
|
|
Repetitive strain injury(RSI)
|
an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.
|
|
Coputer vision sydrome(CVS)
|
a health related concern with your eyes
|
|
Intellectual property rights
|
rights to which creator entitle to work
|
|
Copyright
|
gives author exclusive rights to his/her work
|
|
green computing
|
reducing the electricity and environmental waste while using a computer
|
|
ENERGY STAR program
|
helps reduce the amout of electricity used by computers or other devices
|
|
Cookie
|
a small text file that a Web server stores on your computer
|
|
Spyware
|
a program placed on a computer without the users knowledge
|
|
Adware
|
a program that displays an online advertisment in a banner or pop- up window on Web pages
|
|
Spam
|
an unisolated e-mail message sent to multiple recipients
|
|
Phishing
|
a scam in which a perpetrator sends a real looking e-mail message to obtain someones personal information
|
|
Pharming
|
a scam where a perpetrator attempts to obtain someones personal information except they do it via spoofing
|
|
Employee monitoring
|
involves the use of computers to observe, record, and reveiw an employee's use a computer
|
|
Trusted source
|
A person you believe won't send you a virus knowingly
|
|
Unauthorized use
|
Use of a computer for illegal purposes
|
|
Unauthorized access
|
Use of a computer network without permission
|
|
Biometric device
|
Authenticates a persons identity by translating a personal characteristic
|
|
Digotal Forensics
|
Discovery/collection/analysis of evidence found on computers
|
|
Encryption algorithm
|
A set of steps that convert plain text to cipher text
|
|
Encryption key
|
A programmed formula used to encrypt cipher text
|
|
Plain text
|
Readable data
|
|
Cipher text
|
Unreadable data
|
|
Digital Certificate
|
A notice confirms a user or site is real
|
|
Certificate authority
|
CA. An authorized person that issues/verifies digital certificates
|
|
Surge protector
|
Provides a stable current flow to the computer
|
|
Uninterruptible power supply UPS
|
A device that contains the surge protection circuits and has batteries
|
|
Backup
|
A copy of something that can be used if the original was lost
|
|
Restore
|
Copying the backup file to their original place
|
|
WAP.
|
An unsecured Wireless Access Point
|
|
Ergonomics
|
An applied science devoted to make safety into items
|
|
Computer Addiction
|
When someones social life is consumed by a computer
|
|
Computer Ethics
|
The moral guidelines that govern the use of computers
|
|
National Press Photographers
|
A group that opposes the manipulation of images
|
|
Information privacy
|
The right of individuals to deny/restrict the collection/use of their information about them
|
|
Electronic Profile
|
Forms online that have your information and is stored on a database
|
|
Social engineering
|
Gaining unauthorized access to someone's information by abusing someone's trust
|
|
Content filtering
|
Restricting access to certain material on the Web
|