• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/66

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

66 Cards in this Set

  • Front
  • Back
computer security risk
any event of action that could cause a loss of or damage to a computer hardware
Computer Crime
any illegal act involving a computer
Cybercrime
online or internet-based illegal acts
Hacker
someone who accesses a computer on a network illegally
Cracker
someone who accesses a computer illegally but plans on destroying it
Script Kiddie
same as a cracker, but lack the technical skills and knowledge
Corporate Spies
hired to break into computers to steal information
Cyberextortionist
someone who uses email as a vehicle for extortion
Malware
(Malicious Software)
programs that act without a user knowledge and after the computers operations
Payload
the prank or destruction the program is intended to deliver
Trusted Source
a company or user a person believes will not send virus-infected file
Botnet
group of computers connected to a network such as the internet that attacks other networks
Zombie
compromised computer whose owner is unaware the computer is being controlled remotely by an outsider
DoS Attack
assult on computer whose purpose is to disrupt computer access to an Internet service
Back Door
Program or set of instructions that allows users to by-pass security controls
Spoofing
Technical intruders use this to make their network appear ligitiment to a victim
Unauthorized Use
use of a computer or its ideas data for unapproved or possibly illegal activities
Unauthorized Access
use of a computer or network without permission
CAPTCH
(Completely Automated Public Turing test to tell Computers & Humans apart)
program that verifies users; input is not computer generated
Possessed Object
any item that you must carry to gain access to a computer or computer facility
Biometric Device
Authenitcates a person’s identity by translating a personal characteristics
Digital Forensics
discovery, collection and analysis of evidence found on commuters or networks
Hardware Theft
act of stealing computer equipment
Hardware Vandalism
act of defacing or destroying hardware equipment
Software Theft
when someone steals software media, intentionally erases programs or illegally copies program
License Agreement
Right to use the software
Information Theft
when someone steals personal or confidential information
Encryption
process of converting readable data into unreadable characters to prevent unauthorized access
Decrypt
decipher into readable form
Encryption Algorithm
set of steps that can convert readable plain text into unreadable cipher-text
Encryption Key
programmed formula that the originator uses to encrypt plaintext
plaintext
readable data
ciphertext
scrambled data
Digital Signature
encrypted code that a person, website or organization attacks to a document to verify identity
Digital Certificate
a notice that guarantee’s a user or website is legitimate
Certificate Authority
an authorized person that issues and verifies digital certificates
System Failure
prolonged malfunction of a computer
Surge Protector
uses special electrical components to provide stable current flow to the computer
UPS
(Uninterupted Power Supply)
a device that contains surge protection circuits and batteries that can power something in a power loss
Backup
duplication of a file that can be used if the original is lost, damaged or destroyed
Restore
coping backup files to original location
WAP
(Wireless Access Point)
place to access wi-fi
War Driving
individuals attempt to detect wireless networks via their notebook computer or mobile device
WPA
(Wi-fi Protected Access)
security standard that improves older security standards and provides more advanced techniques
802.11i or WPA 2
the most recent network security standard, conforms the governments security standards and uses more techniques than WPA
RIS
(Repetitive Strain Injury)
jinjury of mussels, nerves, tendons, ligaments and joints
CVS
(Computer Vision Syndrome)
eyes are soar, tired, burning, itching or dry eyes
Ergonomics
science devoted to incorporating comfort in the work place
Computer Addiction
when the computer consume someone’s entire social life
Computer Ethics
moral guidelines that govern the use of computers
National Press Photographers
group that poses manipulation of images
Intellectual Property Rights
rights to which creators are entitled for their work
Copyright
gives authors and artist exclusive rights to duplicate
Green Computing
reducing electricity and environmental waste while using a computer
Energy Star Program
helps reduce the amount of electricity used by computers
Information Privacy
the right of individuals and companies to deny the connection and use info about them
Electronic Profile
electronic info about someone
Cookie
small text file that a web server store on your computer
Spyware
program placed on a computer without the users knowledge
Adware
program that shows online advertising in a pop-up window
Spam
unisolated email message or newsgroup posting sent to multiple recites
Phishing
scam in which a perpetrator sends an official looking email that attempts to steal personal information
Pharming
scam where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing
Social Engineering
gaining unauthorized info for personal information
Employee Monitoring
involves the use of computers to observe, record, and review an employes computer use
Content Filtering
process of restricting material on the web