Ch 9 - The Personal and Social Impact of Computers

studied byStudied by 2 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 24

25 Terms

1
Antivirus program
________: software that runs in the background to protect your computer from dangers lurking on the internet and other possible sources of infected files.
New cards
2
Malware
________: software programs that destroy or damage processing.
New cards
3
Worm
________: parasitic computer program that can create copies of itself on infected computer or send copies to other computers via a network.
New cards
4
Virus
________: computer program file capable of attaching to disks or other files and replicating itself repeatedly.
New cards
5
Ergonomics
________: science of designing machines, products, and systems to maximise the safety, comfort, and efficiency of the people who use them.
New cards
6
Logic bomb
________: type of trojan horse that executes when specific conditions occur.
New cards
7
Identity Theft
________: imposter obtains key pieces of personal identification information to impersonate someone else.
New cards
8
Script bunnies
________: automate the job of crackers.
New cards
9
Trojan horse
________: malicious program that disguises itself as a useful application and purposefully does something the user does not expect.
New cards
10
Code of ethics
________: states the principles and core values that are essential to a set of people and thus governs their behaviour.
New cards
11
Criminal hacker
________ (cracker): gains unauthorised use or illegal access to computer systems.
New cards
12
Hacker
________: learns about and uses computer systems.
New cards
13
Computer Waste
inappropriate use of computer technology and resources
New cards
14
Computer Crime
often defies detection, is the theft of intellectual property
New cards
15
Cyberterrorist
someone who intimated or coerces a government or organisation to advance their political or social objectives by launching computer based attacks against computers or networks
New cards
16
Insider
employee who compromises corporate systems
New cards
17
Software Piracy
act of illegally duplicating software
New cards
18
Internet software piracy
illegally downloading software from the internet
New cards
19
Phishing
gaining access to personal information by redirecting user to fake site
New cards
20
Public key infrastructure (PKI)
enables users of an unsecured public network such as the internet to securely and privately exchange data
New cards
21
Biometrics
measurement of one of a person's traits, whether physical or behavioural
New cards
22
Intrusion detection system (IDS)
software that monitors system and network resources and notifies network security personnel when it senses a possible intrusion
New cards
23
Intrusion activities
failed login attempts, suspicious behaviour
New cards
24
Managed security service provider (MSSP)
organisational that monitors, managers, and maintains network security for both hardware and software
New cards
25
Ergonomics
science of designing machines, products, and systems to maximise the safety, comfort, and efficiency of the people who use them
New cards
robot