Ch 9 - The Personal and Social Impact of Computers

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards

Antivirus program

: software that runs in the background to protect your computer from dangers lurking on the internet and other possible sources of infected files.

2
New cards

Malware

: software programs that destroy or damage processing.

3
New cards

Worm

: parasitic computer program that can create copies of itself on infected computer or send copies to other computers via a network.

4
New cards

Virus

: computer program file capable of attaching to disks or other files and replicating itself repeatedly.

5
New cards

Ergonomics

: science of designing machines, products, and systems to maximise the safety, comfort, and efficiency of the people who use them.

6
New cards

Logic bomb

: type of trojan horse that executes when specific conditions occur.

7
New cards

Identity Theft

: imposter obtains key pieces of personal identification information to impersonate someone else.

8
New cards

Script bunnies

: automate the job of crackers.

9
New cards

Trojan horse

: malicious program that disguises itself as a useful application and purposefully does something the user does not expect.

10
New cards

Code of ethics

: states the principles and core values that are essential to a set of people and thus governs their behaviour.

11
New cards

Criminal hacker

(cracker): gains unauthorised use or illegal access to computer systems.

12
New cards

Hacker

: learns about and uses computer systems.

13
New cards

Computer Waste

inappropriate use of computer technology and resources

14
New cards

Computer Crime

often defies detection, is the theft of intellectual property

15
New cards

Cyberterrorist

someone who intimated or coerces a government or organisation to advance their political or social objectives by launching computer based attacks against computers or networks

16
New cards

Insider

employee who compromises corporate systems

17
New cards

Software Piracy

act of illegally duplicating software

18
New cards

Internet software piracy

illegally downloading software from the internet

19
New cards

Phishing

gaining access to personal information by redirecting user to fake site

20
New cards

Public key infrastructure (PKI)

enables users of an unsecured public network such as the internet to securely and privately exchange data

21
New cards

Biometrics

measurement of one of a person's traits, whether physical or behavioural

22
New cards

Intrusion detection system (IDS)

software that monitors system and network resources and notifies network security personnel when it senses a possible intrusion

23
New cards

Intrusion activities

failed login attempts, suspicious behaviour

24
New cards

Managed security service provider (MSSP)

organisational that monitors, managers, and maintains network security for both hardware and software

25
New cards

Ergonomics

science of designing machines, products, and systems to maximise the safety, comfort, and efficiency of the people who use them