Antivirus program
________: software that runs in the background to protect your computer from dangers lurking on the internet and other possible sources of infected files.
Malware
________: software programs that destroy or damage processing.
Worm
________: parasitic computer program that can create copies of itself on infected computer or send copies to other computers via a network.
Virus
________: computer program file capable of attaching to disks or other files and replicating itself repeatedly.
Ergonomics
________: science of designing machines, products, and systems to maximise the safety, comfort, and efficiency of the people who use them.
Logic bomb
________: type of trojan horse that executes when specific conditions occur.
Identity Theft
________: imposter obtains key pieces of personal identification information to impersonate someone else.
Script bunnies
________: automate the job of crackers.
Trojan horse
________: malicious program that disguises itself as a useful application and purposefully does something the user does not expect.
Code of ethics
________: states the principles and core values that are essential to a set of people and thus governs their behaviour.
Criminal hacker
________ (cracker): gains unauthorised use or illegal access to computer systems.
Hacker
________: learns about and uses computer systems.
Computer Waste
inappropriate use of computer technology and resources
Computer Crime
often defies detection, is the theft of intellectual property
Cyberterrorist
someone who intimated or coerces a government or organisation to advance their political or social objectives by launching computer based attacks against computers or networks
Insider
employee who compromises corporate systems
Software Piracy
act of illegally duplicating software
Internet software piracy
illegally downloading software from the internet
Phishing
gaining access to personal information by redirecting user to fake site
Public key infrastructure (PKI)
enables users of an unsecured public network such as the internet to securely and privately exchange data
Biometrics
measurement of one of a person's traits, whether physical or behavioural
Intrusion detection system (IDS)
software that monitors system and network resources and notifies network security personnel when it senses a possible intrusion
Intrusion activities
failed login attempts, suspicious behaviour
Managed security service provider (MSSP)
organisational that monitors, managers, and maintains network security for both hardware and software
Ergonomics
science of designing machines, products, and systems to maximise the safety, comfort, and efficiency of the people who use them