Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
66 Cards in this Set
- Front
- Back
computer security risk
|
any event of action that could cause a loss of or damage to a computer hardware
|
|
Computer Crime
|
any illegal act involving a computer
|
|
Cybercrime
|
online or internet-based illegal acts
|
|
Hacker
|
someone who accesses a computer on a network illegally
|
|
Cracker
|
someone who accesses a computer illegally but plans on destroying it
|
|
Script Kiddie
|
same as a cracker, but lack the technical skills and knowledge
|
|
Corporate Spies
|
hired to break into computers to steal information
|
|
Cyberextortionist
|
someone who uses email as a vehicle for extortion
|
|
Malware
|
(Malicious Software)
programs that act without a user knowledge and after the computers operations |
|
Payload
|
the prank or destruction the program is intended to deliver
|
|
Trusted Source
|
a company or user a person believes will not send virus-infected file
|
|
Botnet
|
group of computers connected to a network such as the internet that attacks other networks
|
|
Zombie
|
compromised computer whose owner is unaware the computer is being controlled remotely by an outsider
|
|
DoS Attack
|
assult on computer whose purpose is to disrupt computer access to an Internet service
|
|
Back Door
|
Program or set of instructions that allows users to by-pass security controls
|
|
Spoofing
|
Technical intruders use this to make their network appear ligitiment to a victim
|
|
Unauthorized Use
|
use of a computer or its ideas data for unapproved or possibly illegal activities
|
|
Unauthorized Access
|
use of a computer or network without permission
|
|
CAPTCH
|
(Completely Automated Public Turing test to tell Computers & Humans apart)
program that verifies users; input is not computer generated |
|
Possessed Object
|
any item that you must carry to gain access to a computer or computer facility
|
|
Biometric Device
|
Authenitcates a person’s identity by translating a personal characteristics
|
|
Digital Forensics
|
discovery, collection and analysis of evidence found on commuters or networks
|
|
Hardware Theft
|
act of stealing computer equipment
|
|
Hardware Vandalism
|
act of defacing or destroying hardware equipment
|
|
Software Theft
|
when someone steals software media, intentionally erases programs or illegally copies program
|
|
License Agreement
|
Right to use the software
|
|
Information Theft
|
when someone steals personal or confidential information
|
|
Encryption
|
process of converting readable data into unreadable characters to prevent unauthorized access
|
|
Decrypt
|
decipher into readable form
|
|
Encryption Algorithm
|
set of steps that can convert readable plain text into unreadable cipher-text
|
|
Encryption Key
|
programmed formula that the originator uses to encrypt plaintext
|
|
plaintext
|
readable data
|
|
ciphertext
|
scrambled data
|
|
Digital Signature
|
encrypted code that a person, website or organization attacks to a document to verify identity
|
|
Digital Certificate
|
a notice that guarantee’s a user or website is legitimate
|
|
Certificate Authority
|
an authorized person that issues and verifies digital certificates
|
|
System Failure
|
prolonged malfunction of a computer
|
|
Surge Protector
|
uses special electrical components to provide stable current flow to the computer
|
|
UPS
|
(Uninterupted Power Supply)
a device that contains surge protection circuits and batteries that can power something in a power loss |
|
Backup
|
duplication of a file that can be used if the original is lost, damaged or destroyed
|
|
Restore
|
coping backup files to original location
|
|
WAP
|
(Wireless Access Point)
place to access wi-fi |
|
War Driving
|
individuals attempt to detect wireless networks via their notebook computer or mobile device
|
|
WPA
|
(Wi-fi Protected Access)
security standard that improves older security standards and provides more advanced techniques |
|
802.11i or WPA 2
|
the most recent network security standard, conforms the governments security standards and uses more techniques than WPA
|
|
RIS
|
(Repetitive Strain Injury)
jinjury of mussels, nerves, tendons, ligaments and joints |
|
CVS
|
(Computer Vision Syndrome)
eyes are soar, tired, burning, itching or dry eyes |
|
Ergonomics
|
science devoted to incorporating comfort in the work place
|
|
Computer Addiction
|
when the computer consume someone’s entire social life
|
|
Computer Ethics
|
moral guidelines that govern the use of computers
|
|
National Press Photographers
|
group that poses manipulation of images
|
|
Intellectual Property Rights
|
rights to which creators are entitled for their work
|
|
Copyright
|
gives authors and artist exclusive rights to duplicate
|
|
Green Computing
|
reducing electricity and environmental waste while using a computer
|
|
Energy Star Program
|
helps reduce the amount of electricity used by computers
|
|
Information Privacy
|
the right of individuals and companies to deny the connection and use info about them
|
|
Electronic Profile
|
electronic info about someone
|
|
Cookie
|
small text file that a web server store on your computer
|
|
Spyware
|
program placed on a computer without the users knowledge
|
|
Adware
|
program that shows online advertising in a pop-up window
|
|
Spam
|
unisolated email message or newsgroup posting sent to multiple recites
|
|
Phishing
|
scam in which a perpetrator sends an official looking email that attempts to steal personal information
|
|
Pharming
|
scam where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing
|
|
Social Engineering
|
gaining unauthorized info for personal information
|
|
Employee Monitoring
|
involves the use of computers to observe, record, and review an employes computer use
|
|
Content Filtering
|
process of restricting material on the web
|