Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
21 Cards in this Set
- Front
- Back
omputer security risk
|
any event that could cause loss of or damage to a computers hardware
|
|
computer crime
|
any illegal activity involving a computer
|
|
hacker
|
someone who accesses a computer or network illegally
|
|
cracker
|
someone who accesses a computer or network illegally with the intent of destroying data
|
|
script kiddie
|
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action but does not have the technical skills and knowledge.
|
|
corporate spies
|
someone who commits corporate espionage through a computer
|
|
cyberextortionist
|
Someone who uses e-mail as a vehicle for extortion.
|
|
malware
|
Short for malicious software; programs that act without a user's knowledge and deliberately alter a computer's operations.
|
|
payload
|
Destructive event or prank a malicious-logic program is intended to deliver.
|
|
trusted source
|
Company or person a user believes will not send a virus-infected file knowingly.
|
|
botnet
|
Group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes. See also zombie army.
|
|
zombie
|
A compromised computer whose owner is unaware the computer is being controlled remotely by an outsider.
|
|
DoS attack
|
Assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. Also called denial of service attack.
|
|
back door
|
Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
|
|
spoofing
|
Technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
|
|
unauthorized access
|
use of a computer or network without permission.
|
|
unauthorized
|
Use of a computer or its data for unapproved or possibly illegal activities.
|
|
CAPTCHA
|
Completely Automated Public Turing test to tell Computers and Humans Apart; program used by some Web sites to provide further protection for a user's password by verifying that user input is not computer generated.
|
|
possessed objects
|
Any item that a user must carry to gain access to a computer or computer facility.
|
|
biometric device
|
Device that authenticates a person's identity by translating a personal characteristic into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic.
See page567 |
|
digital forensics
|
The discovery, collection, and analysis of evidence found on computers and networks.
|