• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/27

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

27 Cards in this Set

  • Front
  • Back
computer security risk
any event or actionthat could cause a loss of or damage to computer hardware, software, data, information, or processing capability
cyber crime
refers to on-line or internet based illegle acts
hacker
a derogatory meaning and refers to someone who accesses a computer or network illegally
cracker
also someone who accesses a computer or network illegally
script kiddie
has the same intent as a cracker but does not have the technicle skills and knowledge
cyberextortionist
someone who uses e-mmail as a vehicle for extortion
cyberterrorist
someone who uses the internet or network to destroy or damage computers for poltical reasons
virus
a potentionally damaging computer program that affects, or infects, a computer negatively by altering the way that the computer works without the user's permission
worm
a program that copies itself repeatedly, for example in memory or on network, using up resources and possibly shutting down the computer
Trojan Horse
a program that hides within or looks like a legit program
rookit
a program that hides in a computer and allows someone from a remote location to take full control of the computer
malware
short for malicious software, programs that act without a user's permission and deliberately alter the computer's operations
payload
the destructive event or prank the prgram is intended to deliver
trusted source
an organization or person you believe will not send a virus file knowingly
virus signature
a known specific patern of virus code
botnet
a group of comprised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes
denial of service attack
an assault whose purpose is to disrupt computer access such as a web or e-mail
back door
a program or set of instructions in a program that allow users to bypass security controls when accessing a program,computer, or network
spoofing
a technique intruders use to make their network or INternet transmission appear legit to a victim
firewall
hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet
personal firewall
a utility program that detects and protects a personal computer and its data from unauthorized intrusions
Intrusion Detection Software
automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access, and notifies network administrators or suspicious behavior patterns or system breaches
user name
a unique combination of characters, such as letters or numbers, that identifies one specific user
password
a private combination or characters associated with the user name that allows access to certain computer resources
CAPTCHA
a program that verifies user input is not computer generated
biometric device
authenticates a person's identity by translating a personal characteristic, such as fingerprint, into a digital code that is compared with a digital code stored in the computer
digital forensics
the discovery, collection, and analysis of evidence found on computers and networks