Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

24 Cards in this Set

  • Front
  • Back
the practice of talking a critical computer password out of an individual
social engineering
searching through the garbage for important pieces of information that can help crack an organization's computers or be used to convince someone at the company to give access to the computers
dumpster diving
A crime in which an imposter obtains key pieces of personal identification information in order to impersonate someone else
idenity theft
a computer-savvy person who attempts to gain unauthorized or illegal access to computer systems
criminal hacker (cracker)
a program that attaches itself to other programs
Functions as an independent program, replicating its own program files until it destroys other systems and programs or interrupts the operation of computer systems and networks
a worm
designed to "explode" or execute at a specified time and date
logic bomb
a program that appears to be useful but actually masks a destructive program
trojan horse
a small program hidden in a network or a computer system that records identification numbers and passwords
password sniffer
the act of illegally duplicating software
software piracy
Illegally gaining access to and using the internet
internet piracy
Provides another layer of protection in the event that an intruder gets past the outer security layers-passwords, security procedures and the corporate firewall
Intrusion detection system
These security opertaions monitor and maintain network security hardware and software
Managed security service providers
Enables users of an unsecure public network such as the Internet to securely and privately exchange data throught the use of a public and a prvate cryptographic key pair that is obtained and shared through a trusted authority
Public Key ingrastructure
the measurement of a living trait, whether it be physical or behavior
Programs or utilities that prevent viruses and recover from them if they infect a computer
antivirus program
A system to prtect individuals from harmful or objectionable internet content while safeguarding the free-speech rights of others
ICRA rating system
The right to be left alone
Privacy Act of 1974
This act requires ISP's and telephone companies to turn over customer info without a court order if related to terrorism
USA Patriot Act
A screening technology that shields users from Web sites that don't provide the level of privacy protection they desire
P3P, Platform for Privacy Preferences
An injury that can be caused by working with computer keyboards and other equipment
Repetitive motion disorder
Included but not limited to tendonitis, tennis elbow, the inability to hold objects and sharp pain in fingers
Repetitive stress injury
the aggravation of the pathway for nerves that travel through the wrist
carpal tunnel syndrome
the study of designing and positioning computer equipment for employee health and safety