Ch 9 - The Personal and Social Impact of Computers

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/24

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

25 Terms

1
New cards
Antivirus program
________: software that runs in the background to protect your computer from dangers lurking on the internet and other possible sources of infected files.
2
New cards
Malware
________: software programs that destroy or damage processing.
3
New cards
Worm
________: parasitic computer program that can create copies of itself on infected computer or send copies to other computers via a network.
4
New cards
Virus
________: computer program file capable of attaching to disks or other files and replicating itself repeatedly.
5
New cards
Ergonomics
________: science of designing machines, products, and systems to maximise the safety, comfort, and efficiency of the people who use them.
6
New cards
Logic bomb
________: type of trojan horse that executes when specific conditions occur.
7
New cards
Identity Theft
________: imposter obtains key pieces of personal identification information to impersonate someone else.
8
New cards
Script bunnies
________: automate the job of crackers.
9
New cards
Trojan horse
________: malicious program that disguises itself as a useful application and purposefully does something the user does not expect.
10
New cards
Code of ethics
________: states the principles and core values that are essential to a set of people and thus governs their behaviour.
11
New cards
Criminal hacker
________ (cracker): gains unauthorised use or illegal access to computer systems.
12
New cards
Hacker
________: learns about and uses computer systems.
13
New cards
Computer Waste
inappropriate use of computer technology and resources
14
New cards
Computer Crime
often defies detection, is the theft of intellectual property
15
New cards
Cyberterrorist
someone who intimated or coerces a government or organisation to advance their political or social objectives by launching computer based attacks against computers or networks
16
New cards
Insider
employee who compromises corporate systems
17
New cards
Software Piracy
act of illegally duplicating software
18
New cards
Internet software piracy
illegally downloading software from the internet
19
New cards
Phishing
gaining access to personal information by redirecting user to fake site
20
New cards
Public key infrastructure (PKI)
enables users of an unsecured public network such as the internet to securely and privately exchange data
21
New cards
Biometrics
measurement of one of a person's traits, whether physical or behavioural
22
New cards
Intrusion detection system (IDS)
software that monitors system and network resources and notifies network security personnel when it senses a possible intrusion
23
New cards
Intrusion activities
failed login attempts, suspicious behaviour
24
New cards
Managed security service provider (MSSP)
organisational that monitors, managers, and maintains network security for both hardware and software
25
New cards
Ergonomics
science of designing machines, products, and systems to maximise the safety, comfort, and efficiency of the people who use them