Roy Swatzell Computer Science Final Exam

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

60 Terms

1
New cards

Pretexting

deceiving by pretending to be someone else

2
New cards

Phishing

obtaining unauthorized access to data via email

3
New cards

Spoofing

someone pretending to be someone else.

4
New cards

Sniffing

intercepting computer communications

5
New cards

Usurping

invading a computer system and replacing legitimate programs with their own unauthorized programs that disrupt services.

6
New cards

Malware

Viruses, Worms, Trojan Horse, Spyware and Adware

7
New cards

Virus

is a computer program that replicates itself ultimately consuming the computer's resources

8
New cards

Worms

are viruses that propagate themselves using the Internet or other computer networks

9
New cards

Spyware/Adware

invade your computer and capture keystroke information. Spyware does so for malicious reasons and Adware just does so to report activity to allow for targeted ads

10
New cards

Beacons

are tiny files that gather demographic information about you. Your info can then be sold several times a day and constitute a profile of your likes and habits. Lotame Solutions specializes in Beacons

11
New cards

Bot

is a new term for the family of Viruses, Worms, Trojan Horse, Spyware and Adware

12
New cards

Bot herder

refers to the individual or organization that controls the Bots. North Korean Armay is responsible for most bots in the US since 2009. The Chinese Army is another primary source of Bots.

13
New cards

Honeypots

are false targets for criminals to attack

14
New cards

electronic counter-measures

Firewalls
Encryption
Additional Passwords
Antispyware/anti-adware software
Backups/ RAID, off site backup storage

15
New cards

Internet

is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals

16
New cards

The Internet originated as

ARPANET

17
New cards

ARPANET had two main goals

1. Allow scientists at different physical locations to share information and work together

2. Function even if part of the network were disabled or destroyed by a disaster

18
New cards

host

provides connections and services to other computers on a network.

19
New cards

2 ways to connect to the internet

1. With wired connections, a computer or device physically attaches via a cable or wire to a communications device.

2. Computers without a communications device can use a wireless modem hooked to USB port using a cellular connection.

20
New cards

3 ways we make up a wired connection:

1. Cable Internet service
2. DSL (digital subscriber line)
3. Fiber to the Premises (FTTP) .

21
New cards

There are 4 ways to make up a wireless connection:

1. Wi-Fi (wireless fidelity)
2. Mobile broadband
3. Fixed wireless
4. Satellite Internet Service

22
New cards

Bandwidth

he amount of data that travels over a network.

23
New cards

IP address

a sequence of numbers that uniquely identifies each computer or device connected to the Internet

24
New cards

domain name

a text-based name that corresponds to the IP address

25
New cards

DNS server

translates the domain name into its associated IP address

26
New cards

World Wide Web (WWW), or web

consists of a worldwide collection of electronic documents (webpages)

27
New cards

website

a collection of related webpages and associated items

28
New cards

web server

a computer that delivers requested webpages to your computer

29
New cards

Web 2.0

refers to websites that provide a means for users to share personal information, allow users to modify website content, and provide applications through a browser

30
New cards

browser

an application that enables users with an Internet connection to access and view webpages on a computer or mobile device

31
New cards

home page

the first page that a website displays

32
New cards

search engine

software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic

33
New cards

subject directory

classifies webpages in an organized set of categories, such as sports or shopping, and related subcategories

34
New cards

graphic

a digital representation of non-text information. Graphic formats include BMP, GIF, JPEG, PNG, and TIFF

35
New cards

info-graphic

a visual representation of data and information, designed to communicate quickly, simplify complex concepts, or present patterns or trends

36
New cards

Email

he transmission of messages and files via a computer network

37
New cards

email program

allows you to create, send, receive, forward, store, print, and delete email messages

38
New cards

email list

a group of email addresses used for mass distribution of a message

39
New cards

Instant messaging (IM)

a real-time Internet communications service

40
New cards

discussion forum

an online area in which users have written discussions about a particular subject

41
New cards

VoIP (Voice over IP)

enables users to speak to other users over the Internet

42
New cards

FTP (File Transfer Protocol)

an Internet standard that permits file uploading and downloading to and from other computers on the Internet.

43
New cards

3 functions of ISP

1)provides you with an internet address

2) serves as a gateway to the internet

3)pays for your access service.

44
New cards

3 ways you connect to the internet:

1) Digital Subscriber Line (DSL)

2) Cable Modem

3) Wi-Fi

45
New cards

What is IS Risk Assessment?

Risk Assessment is the process of evaluating the potential vulnerability of IS systems

46
New cards

What is Risk Management?

Risk Management is the process of placing safeguards in place to reduce the vulnerability to a risk.

47
New cards

How do we conduct a Risk Assessment?

Identify all known risks
Identify impact
Assessment likelihood of risk
Determine mitigation plan

48
New cards

What are some vulnerabilities that put IS systems at risk?

Electronic intrusions (Hacking, Viruses, Adware, Trojans)
Electronic theft of data (stolen passwords, unprotected system access)
Human Error (software vulnerabilities)
Employee theft (Fraud, embezzlement)
Hardware failures (failure to backup and protect data, system server loss)
Computer Crime (Pretexting, Phishing, Spoofing, Sniffing)
Programming Errors (faulty code that generate accounting errors)

49
New cards

cybercafé

a location that provides computers with Internet access, usually for a fee

50
New cards

Internet service provider (ISP)

a business that provides individuals and organizations access to the Internet free or for a fee

51
New cards

Electronic bulletin boards

online communication systems where one can share, request, or discuss information on just about any subject. E-mail is a way to converse privately with one or more people over the Internet; electronic bulletin boards are public.

52
New cards

blog

an online journal or informational website displaying information in the reverse chronological order, with latest posts appearing first. It is a platform where a writer or even a group of writers share their views on an individual subject

53
New cards

Calendaring software

software that minimally provides users with an electronic version of a calendar

54
New cards

Desktop sharing

a common name for technologies and products that allow remote access and remote collaboration on a person's computer desktop through a graphical terminal emulator.

55
New cards

podcast

an episodic series of digital audio files that a user can download in order to listen. Alternatively, the word "podcast" may refer to the individual component of such a series or to an individual media file.

56
New cards

RSS

Really Simple Syndication,
a type of web feed which allows users and applications to access updates to websites in a standardized, computer-readable format. These feeds can, for example, allow a user to keep track of many different websites in a single news aggregator

57
New cards

Web-based project management software

a type of software that allows users to work on collaborative projects online.

58
New cards

Web conferencing

may be used as an umbrella term for various types of online collaborative services including web seminars, webcasts, and peer-level web meetings.

59
New cards

webcast

a media presentation distributed over the Internet using streaming media technology to distribute a single content source to many simultaneous listeners/viewers.

60
New cards

Unified communications (UC)

business and marketing concept describing the integration of enterprise communication services such as instant messaging (chat), presence information, voice (including IP telephony), mobility features