Ch 9 - The Personal and Social Impact of Computers

studied byStudied by 2 people
0.0(0)
Get a hint
Hint

Antivirus program

1 / 24

25 Terms

1

Antivirus program

________: software that runs in the background to protect your computer from dangers lurking on the internet and other possible sources of infected files.

New cards
2

Malware

________: software programs that destroy or damage processing.

New cards
3

Worm

________: parasitic computer program that can create copies of itself on infected computer or send copies to other computers via a network.

New cards
4

Virus

________: computer program file capable of attaching to disks or other files and replicating itself repeatedly.

New cards
5

Ergonomics

________: science of designing machines, products, and systems to maximise the safety, comfort, and efficiency of the people who use them.

New cards
6

Logic bomb

________: type of trojan horse that executes when specific conditions occur.

New cards
7

Identity Theft

________: imposter obtains key pieces of personal identification information to impersonate someone else.

New cards
8

Script bunnies

________: automate the job of crackers.

New cards
9

Trojan horse

________: malicious program that disguises itself as a useful application and purposefully does something the user does not expect.

New cards
10

Code of ethics

________: states the principles and core values that are essential to a set of people and thus governs their behaviour.

New cards
11

Criminal hacker

________ (cracker): gains unauthorised use or illegal access to computer systems.

New cards
12

Hacker

________: learns about and uses computer systems.

New cards
13

Computer Waste

inappropriate use of computer technology and resources

New cards
14

Computer Crime

often defies detection, is the theft of intellectual property

New cards
15

Cyberterrorist

someone who intimated or coerces a government or organisation to advance their political or social objectives by launching computer based attacks against computers or networks

New cards
16

Insider

employee who compromises corporate systems

New cards
17

Software Piracy

act of illegally duplicating software

New cards
18

Internet software piracy

illegally downloading software from the internet

New cards
19

Phishing

gaining access to personal information by redirecting user to fake site

New cards
20

Public key infrastructure (PKI)

enables users of an unsecured public network such as the internet to securely and privately exchange data

New cards
21

Biometrics

measurement of one of a person's traits, whether physical or behavioural

New cards
22

Intrusion detection system (IDS)

software that monitors system and network resources and notifies network security personnel when it senses a possible intrusion

New cards
23

Intrusion activities

failed login attempts, suspicious behaviour

New cards
24

Managed security service provider (MSSP)

organisational that monitors, managers, and maintains network security for both hardware and software

New cards
25

Ergonomics

science of designing machines, products, and systems to maximise the safety, comfort, and efficiency of the people who use them

New cards

Explore top notes

note Note
studied byStudied by 23 people
... ago
5.0(1)
note Note
studied byStudied by 86 people
... ago
4.7(3)
note Note
studied byStudied by 127 people
... ago
4.0(2)
note Note
studied byStudied by 16 people
... ago
5.0(1)
note Note
studied byStudied by 19 people
... ago
5.0(1)
note Note
studied byStudied by 18 people
... ago
5.0(1)
note Note
studied byStudied by 12 people
... ago
5.0(1)
note Note
studied byStudied by 305 people
... ago
4.8(5)

Explore top flashcards

flashcards Flashcard (35)
studied byStudied by 47 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 57 people
... ago
5.0(1)
flashcards Flashcard (81)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (51)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 6 people
... ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 5 people
... ago
5.0(1)
flashcards Flashcard (42)
studied byStudied by 3 people
... ago
5.0(1)
robot