Send a link to your students to track their progress
339 Terms
1
New cards
hacker
A person who breaks into a computer system
2
New cards
phreaking
Subverting the phone system to get free service
3
New cards
script kiddle
An amateur hacker who simply uses the hacking tools developed by others
4
New cards
hacktivism
Cracking into a system as a political act
5
New cards
hackers manifesto
A document, written anonymously, that justifies cracking into systems as an ethical exercise
6
New cards
backdoors
Shortcuts into programs created by system designers to facilitate system maintenance but used and abused by crackers
7
New cards
program overflow
When a program tries to place more information into a memory location than that location can handle
8
New cards
malicious code
Code designed to breach system security and threaten digital information
9
New cards
virus
An uninvited guest program with the potential to damage files and the operating system
10
New cards
worm
A type of bot that can roam a network looking for vulnerable systems and replicate itself on those systems
11
New cards
bot
A software program that can roam the Internet autonomously; bots can be quite benign and useful, such as those used by Google and other search engines to find Web pages to list in search results
12
New cards
trojan program
A program that poses as an innocent program
13
New cards
dumpster diving
Picking through people's trash to find things of value
14
New cards
sniffer
A software pro-gram that allows the user to listen in on network traffic
15
New cards
Denial of Service attack (DOS)
Attacks that prevent legitimate users from using the system or accessing information
16
New cards
repudiation attack
Attacks on a system that injure the information's reliability
17
New cards
risk
The relationship between vulnerability and threat
18
New cards
vulnerability
The sensitivity of information combined with the skill level the attacker needs to threaten that information
19
New cards
threat
The likely agent of a possible attack, the event that would occur as a result of an attack, and the target of the attack
20
New cards
integrity
Assurance that information is what you think it is and hasn't been modified
21
New cards
availability
Accessibility of information and services on a normal basis
22
New cards
accountability
Making sure a system is as secure as feasible and a record of activities exists for reconstructing a break- in
23
New cards
authentication
A technique for verifying that someone is who he or she claims to be; a password is one type of authentication
24
New cards
VPN
A private network connection that " tunnels" through a larger public network and is restricted to authorized users
25
New cards
disaster recovery plan
A written plan for responding to natural or other disasters, intended to minimize downtime and damage to systems and data
26
New cards
honeypot
A trap, such as a prgram or system, laid by a system administrator to catch and track intruders
27
New cards
encryption key
A string of bits used in an encryption algorithm to encrypt or decrypt data
28
New cards
digital certificate
The digital equivalent of an ID card; used with encryption and issued by a third- party certification authority
29
New cards
firewall
Software and/ or hardware that sits between an external network and an internal computer system that monitors
30
New cards
demilitarized zone (DMZ)
The location outside or between firewalls that's more vulnerable to attack from outside
31
New cards
copyright
The legal right granted to an author, a composer, an artist, a publisher, a playwright, or a distributor to exclusive sale, publication, production, or distribution of literary, artistic, musical, or dramatic works
32
New cards
patent
A government grant that gives the sole right to make, use, and sell an invention for a specified period of time
33
New cards
spyware
Software that can track, collect, and transmit to a third party or Web site certain information about a user's computer habits
34
New cards
802.11i
Sometimes called WPA2, a network standard developed by IEEE with enhanced security for wireless communications.
35
New cards
access control
Security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer
36
New cards
adware
Program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services
37
New cards
anti-spam program
Program that attempts to remove spam before it reaches a user's inbox
38
New cards
antivirus program
Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files
39
New cards
audit trail
Computer file that records both successful and unsuccessful access attempts
40
New cards
back door
Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network
41
New cards
back up
To make a copy of selected files or an entire hard disk to another storage medium
42
New cards
backup
Duplicate of a file, program, or disk placed on a separate storage medium that can be used if the original is lost, damaged, or destroyed
43
New cards
biometric device
Device that translates a personal characteristic into a digital code that is compared with a digital code stored in a computer
44
New cards
botnet
Group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes
45
New cards
CAPTCHA
Completely Automated Public Turing test to tell Computers and Humans Apart; program used by some Web sites to provide further protection for a user's password by verifying that user input is not computer generated
46
New cards
certificate authority
Authorized person or company that issues and verifies digital certificates
47
New cards
clickjacking
Scam in which an object that can be clicked on a Web site, such as a button, image, or link, contains a malicious program
48
New cards
code of conduct
Written guidelines that help determine whether a specific computer action is ethical or unethical
49
New cards
computer addiction
Growing health problem that occurs when the computer consumes someone's entire social life
50
New cards
computer crime
Any illegal act involving a computer
51
New cards
computer ethics
Moral guidelines that govern the use of computers and information systems
52
New cards
computer security risk
Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
53
New cards
computer vision syndrome
Eyestrain due to prolonged computer usage
54
New cards
content filtering
Process of restricting access to certain material on the Web
55
New cards
cookie
Small text file that a Web server stores on a computer
56
New cards
copyright
Exclusive rights given to authors and artists to duplicate, publish, and sell their materials
57
New cards
cracker
Someone who accesses a computer or network illegal with the intent of destroying data, stealing information, or other malicious action
58
New cards
cybercrime
Online or Internetbased illegal acts
59
New cards
cyberextortionist
Someone who uses e-mail as a vehicle for extortion
60
New cards
cyberterrorist
Someone who uses the Internet or network to destroy or damage computers for political reasons
61
New cards
decrypt
Process of deciphering encrypted data into a readable form
62
New cards
denial of service attack
Assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail
63
New cards
digital certificate
A notice that guarantees a user or a Web site is legitimate
64
New cards
digital forensics
The discovery, collection, and analysis of evidence found on computers and networks
65
New cards
digital rights management
Strategy designed to prevent illegal distribution of movies, music, and other digital content
66
New cards
digital signature
Encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender
67
New cards
DoS attack
Assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail
68
New cards
e-mail filtering
Service that blocks e-mail messages from designated sources
69
New cards
employee monitoring
The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited
70
New cards
encryption
The process of encoding data and information to an unreadable form
71
New cards
encryption algorithm
Set of steps that can convert readable plaintext into unreadable ciphertext
72
New cards
encryption key
Set of characters that the originator of the encrypted data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext
73
New cards
ENERGY STAR program
Program developed by the United States Department of Energy (DOE) and the United States Environmental Protection Agency (EPA) to help reduce the amount of electricity used by computers and related devices
74
New cards
Fair Credit Reporting Act
1970 law that limits the rights of others viewing a credit report to only those with a legitimate business need
75
New cards
firewall
Hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet
76
New cards
green computing
Practices that involve reducing the electricity consumed and environmental waste generated when using a computer
77
New cards
hacker
Someone who accesses a computer or network illegally
78
New cards
hardware theft
The act of stealing computer equipment
79
New cards
hardware vandalism
The act of defacing or destroying computer equipment
80
New cards
information privacy
Right of individuals and companies to deny or restrict the collection and use of information about them
81
New cards
information theft
Computer security risk that occurs when someone steals personal or confidential information
82
New cards
inoculate
Capability of an antivirus program to record information such as file size and file creation date in a separate file in order to detect viruses
83
New cards
intellectual property rights
Rights to which creators are entitled for their work
84
New cards
intrusion detection software
Program that automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized intrusions, and notifies network administrators of suspicious behavior patterns or system breaches
85
New cards
license agreement
An agreement issued by a software manufacturer that gives the user the right to use the software
86
New cards
malware
Short for malicious software; programs that act without a user's knowledge and deliberately alter a computer's operations
87
New cards
noise
Electrical disturbance that can degrade communications
88
New cards
online security service
Web site that evaluates a computer to check for Internet and e-mail vulnerabilities
89
New cards
overvoltage
Electrical disturbance that occurs when the incoming electrical power increases significantly above the normal 120 volts
90
New cards
password
Private combination of characters associated with a user name that allows access to certain computer resources
91
New cards
payload
Destructive event or prank a malicious-logic program is intended to deliver
92
New cards
personal firewall
Utility program that detects and protects a personal computer from unauthorized intrusions
93
New cards
personal identification number (PIN)
Numeric password, either assigned by a company or selected by a user
94
New cards
pharming
Scam, similar to phishing, where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing
95
New cards
phishing
Scam in which a perpetrator attempts to obtain your personal and/or financial information
96
New cards
phishing filter
Program that warns or blocks you from potentially fraudulent or suspicious Web sites
97
New cards
piracy
Unauthorized and illegal duplication of copyrighted material
98
New cards
possessed object
Any item that a user must carry to gain access to a computer or computer facility
99
New cards
power surge
Electrical disturbance that occurs when the incoming electrical power increases significantly above the normal 120 volts
100
New cards
product activation
Technique that some software manufacturers use to ensure that software is not installed on more computers than legally licensed