• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/26

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

26 Cards in this Set

  • Front
  • Back
Back door
Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
Back up
To make a copy of a file.
Biometric device
Device that authenticates a person's identity by translating a personal characteristic, such as a finger print, into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic.
See page567
Botnet
Group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes
Computer crime
Any illegal act involving a computer.
Computer ethics
Moral guidelines that govern the use of computers and information systems.
copyright
Exclusive rights given to authors and artists to duplicate, publish, and sell their materials.
cracker
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action.
cybercrime
Online or Internet-based illegal acts.
denial of service attack
Assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. Also called denial of service attack.
digital certificate
A notice that guarantees a user or a Web site is legitimate.
employee monitoring
The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.
encryption
Process of converting readable data into unreadable characters to prevent unauthorized access.
hacker
Someone who accesses a computer or network illegally.
information theft
Computer security risk that occurs when someone steals personal or confidential information.
inoculate
Capability of an antivirus program to record information such as file size and file creation date in a separate file in order to detect viruses.
license agreement
An agreement issued by a software manufacturer that gives the user the right to use the software.
phishing
Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information.
piracy
Unauthorized and illegal duplication of copyrighted material.
quarantine
Separate area of a hard disk that holds the infected file until a virus can be removed.
spam
Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once.
spoofing
Technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
surge protector
Device that uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment
trusted source
Company or person a user believes will not send a virus-infected file knowingly.
unauthorized access
Use of a computer or network without permission.
uninterruptible power supply (UPS)
Device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.