• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

Card Range To Study



Play button


Play button




Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

26 Cards in this Set

  • Front
  • Back
Back door
Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
Back up
To make a copy of a file.
Biometric device
Device that authenticates a person's identity by translating a personal characteristic, such as a finger print, into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic.
See page567
Group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes
Computer crime
Any illegal act involving a computer.
Computer ethics
Moral guidelines that govern the use of computers and information systems.
Exclusive rights given to authors and artists to duplicate, publish, and sell their materials.
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action.
Online or Internet-based illegal acts.
denial of service attack
Assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. Also called denial of service attack.
digital certificate
A notice that guarantees a user or a Web site is legitimate.
employee monitoring
The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.
Process of converting readable data into unreadable characters to prevent unauthorized access.
Someone who accesses a computer or network illegally.
information theft
Computer security risk that occurs when someone steals personal or confidential information.
Capability of an antivirus program to record information such as file size and file creation date in a separate file in order to detect viruses.
license agreement
An agreement issued by a software manufacturer that gives the user the right to use the software.
Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information.
Unauthorized and illegal duplication of copyrighted material.
Separate area of a hard disk that holds the infected file until a virus can be removed.
Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once.
Technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
surge protector
Device that uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment
trusted source
Company or person a user believes will not send a virus-infected file knowingly.
unauthorized access
Use of a computer or network without permission.
uninterruptible power supply (UPS)
Device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.