Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
71 Cards in this Set
- Front
- Back
Any illegal act involving a computer
|
Computer Crime
|
|
occurs whenever an individual gains access to a computer network, file, or other resource without permission.
|
Unauthorized access
|
|
using a computer resource for unauthorized activities
|
unauthorized use
|
|
T/F unauthorized use can occur even if the user is authorized to access that computer or network but is not authorized for that particular activity.
|
T
|
|
using a computer to break into another computer system
|
Hacking
|
|
sets of tools that allows hackers to access a system
|
root kits
|
|
terrorists launch attacks via the internet
|
cyberterrorism
|
|
people that perform authorized hacks
|
white hat hackers
|
|
hackers that break the law
|
black hat hackers
|
|
individuals who break into systems to be destructive or for material gain
|
cracker
|
|
hackers that break into telephone systems to make phone calls at someone else expense
|
phreakers
|
|
the main federal law regarding computer crime
|
Computer Fraud and Abuse Act
|
|
Driving around an area with a Wi-Fi enabled computer or mobile device to find a Wi-Fi network to access nd use without authorization
|
War driving
|
|
Accessing an unsecured Wi-Fi network from your current location without authorization
|
Wi-Fi piggybacking
|
|
An act of malicious destruction to a computer or computer resource
|
Computer sabotage
|
|
A computer that is controlled by a hacker or other computer criminal
|
Bot
|
|
A group of bots that are controlled by one individual
|
Botnet
|
|
Any type of malicious software
|
malware
|
|
A software program installed without the users knowledge and designed to alter the way a computer operates or to cause harm to the computer system
|
computer virus
|
|
A malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers
|
Computer worm
|
|
A malicious program that masquerades as something else
|
Trojan horse
|
|
An act of sabotage that attempts to flood a network server or a Web server with so much activity that is unable to function
|
Denial of service (Dos) attack
|
|
A comprehensive system that controls the initial access to a computer system
|
Network access control (NAC) system
|
|
An access control system that uses information only the individual should know to identify that individual
|
Possessed Knowledge Access system
|
|
A secret combination of characters used to gain access to a computer, computer network, or other resource
|
Password
|
|
An access control system that uses physical objects an individual has in his or her possession to identify that individual
|
Possessed object access system
|
|
An access control system that uses one unique physical characteristic of an individual to authenticate that individual
|
Biometric access system
|
|
T/F Trojan horse can not replicate themselves, and spreads by being downloaded
|
True
|
|
activates when it detects a certain condition
|
Logic bomb virus
|
|
not designed to do any permanent damage
|
Benign virus
|
|
logic bomb whose trigger is a particular date or time
|
Time bomb
|
|
T/F writing a computer malware is illegal
|
False
|
|
T/F Distributing malware is illegal
|
True
|
|
designed to take control of peoples PC's in order to hijack them for spam distribution and to perform denial of service attacks
|
Storm worm
|
|
Dos Attacks that utilize multiple computers
|
Distributed denial of service attack
|
|
defacing or otherwise changing websites without permission
|
Web site Defacement
|
|
T/F Access control systems can be used as identification systems
|
True
|
|
used to generate a new pass-code every 30 or 60 seconds
|
security token
|
|
uses information that an individual should know or easily can remember
|
cognitive authentication
|
|
using two different methods to authenticate a user
|
two-factor authentication
|
|
flash memory drives that are inserted into a PC to grant access to a network,to supply web site user-names and passwords, or to provide other security features
|
e-tokens
|
|
used to recognize an individuals unique typing pattern
|
keystroke dynamics
|
|
T/F Biometric access systems can only perform identification
|
F- authentication and identification
|
|
using a combination of biometric features
|
fusion biometrics/ multi-modal biometrics
|
|
a piece of hardware containing a set of preinstalled security software that connects to a network to secure it
|
Security appliance
|
|
A collection of hardware and/or software intended to protect a computer or computer network from unauthorized access
|
Firewall
|
|
software-based systems that are geared toward protecting home Pcs from hackers attempting to access those computers through their internet connection
|
Personal firewalls
|
|
T/F Routers. modems, other networking hardware also include built-in firewalls to help secure the networks
|
True
|
|
the electronic connections that allow a PC to communicate with other computers, to unauthorized computers and programs
|
External communications port address
|
|
continuously monitors and analyzes the traffic allowed by the firewall to try to detect possible attacks as they are occurring
|
Intrusion prevention systems (IPS)
|
|
a Microsoft technology that allows websites and e-mail attachments to run executable programs on users PCs
|
ActiveX
|
|
A method of scrambling e-mail or files to make them unreadable if they are intercepted by an unauthorized user
|
Encryption
|
|
A web page that use Encryption to protect information transmitted via that web page
|
Secure Web page
|
|
The most common security protocols used with secure web pages are Secure Sockets Layer (SSL) and Extended Validation Secure Sockets Layer
|
True
|
|
A private, secure path over the internet that provides authorized users a secure means of accessing a private network Via the internet
|
Virtual private Network
|
|
Software used to detect and eliminate computer viruses and other types of malware
|
Anti-virus software
|
|
a process in which students are not granted accesss to the college network until they complete a security process that checks their PCs for security threats, updates their operating systems, and installs anti virus software
|
Quarantine
|
|
protects against viruses sent via e-mail
|
e-mail authentication system
|
|
states that employees should be granted the least amount of access to the company network that they need to perform their job
|
The principle of least privilege
|
|
trying to trick your employees with spear phishing and other schemes that result in downloading malware or revealing sensitive information
|
inoculation
|
|
using someone elses identity to purchase goods or services, obtain new credit cards or bank loans, or otherwise illegally masquerade as that individual
|
Identity theft
|
|
occurs when an online auction buyer pays for merchandise that is never delivered, or that is delivered but not represented
|
Online Auction fraud
|
|
A software program installed without the users knowledge that secretly collects information and sends it to an outside party via the users internet connection
|
Spyware
|
|
aggressive spy ware that deliver ads regardless of the activity you are doing on your pc, changing your browser home page or resetting your browser settings
|
stealthware
|
|
spyware program changes your browser settings back to the hijacked settings each time you reboot your PC
|
Windows Registry
|
|
A unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been changed since it was signed
|
Digital signature
|
|
A group of electronic data such as encryption key pairs and digital signature that can be used to verify the identity of a person or organization
|
Digital certificate
|
|
bullying an individual via the internet
|
Cyberbullying
|
|
Repeated threats or harassing behavior via e-mail or another internet communications method
|
cyberstalking
|
|
includes a security rule that sets minimum security standards to protect health information stored electronically
|
Health insurance portability and Accountability act
|
|
grants federal authorities expanded surveillance
|
USA patriot Act
|