ITM 100 Class 9 (4.2) Key Terms 2025/2026

0.0(0)
studied byStudied by 4 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/61

flashcard set

Earn XP

Description and Tags

Exam review from textbook.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

62 Terms

1
New cards

adware

Software that, although purporting to serve some useful function and often fulfilling that function, also allows Internet advertisers to display advertisements without the consent of the computer user.

2
New cards

antispyware software

Refers to specialized software designed to detect, prevent, and remove spyware from computers and other digital devices.

3
New cards

antivirus software

Scans and searches hard drives to prevent, detect, and remove known viruses, adware, and spyware.

4
New cards

authentication

A method for confirming users’ identities.

5
New cards

authorization

The process of providing a user with permission including access levels and abilities such as file access, hours of access, and amount of allocated storage space.

6
New cards

biometrics

The identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting.

7
New cards

black-hat hacker

Breaks into other people’s computer systems and may just look around or may steal and destroy information.

8
New cards

bug bounty program

A crowdsourcing initiative that rewards individuals for discovering and reporting software bugs.

9
New cards

certificate authority

A trusted third party, such as VeriSign, that validates user identities by means of digital certificates.

10
New cards

content filtering

Occurs when organizations use software that filters content to prevent the transmission of unauthorized information.

11
New cards

cracker

A hacker with criminal intent.

12
New cards

cryptography

The science that studies encryption, which is the hiding of messages so that only the sender and receiver can read them.

13
New cards

cyberattack

Malicious attempts to access or damage a computer system.

14
New cards

cyberespionage

Includes governments that are after some form of information about other governments.

15
New cards

cybersecurity

Involves prevention, detection, and response to cyberattacks that can have wide-ranging effects on the individual, organizations, community, and at the national level.

16
New cards

cyberterrorism

The use of computer and networking technologies against persons or property to intimidate or coerce governments, individuals, or any segment of society to attain political, religious, or ideological goals.

17
New cards

cyberterrorists

Seek to cause harm to people or to destroy critical systems or information and use the Internet as a weapon of mass destruction.

18
New cards

cybervigilantes

Include individuals that seek notoriety or want to make a social or political point such as WikiLeaks.

19
New cards

cyberwar

An organized attempt by a country’s military to disrupt or destroy information and communication systems for another country.

20
New cards

decrypt

Decodes information and is the opposite of encrypt.

21
New cards

destructive agents

Malicious agents designed by spammers and other Internet attackers to farm email addresses off websites or deposit spyware on machines.

22
New cards

digital certificate

A data file that identifies individuals or organizations online and is comparable to a digital signature.

23
New cards

digital footprint

Everything a customer does on a company’s website or applications and is collected and analyzed for target marketing such as customized ads and coupons.

24
New cards

digital identity

Represents an individual or entity in the digital realm and encompasses user names, passwords, biometric data, email addresses, and social media profiles.

25
New cards

downtime

Refers to a period of time when a system is unavailable.

26
New cards

drive-by hacking

A computer attack where an attacker accesses a wireless computer network, intercepts data, uses network services, and/or sends attack instructions without entering the office or organization that owns the network.

27
New cards

dumpster diving

Looking through people’s trash, another way hackers obtain information.

28
New cards

encryption

Scrambles information into an alternative form that requires a key or password to decrypt the information.

29
New cards

ethical hacker

A person who hacks into a computer system to find vulnerabilities to help a company test its security.

30
New cards

firewall

Hardware and/or software that guards a private network by analyzing the information leaving and entering the network.

31
New cards

hackers

Experts in technology who use their knowledge to break into computers and computer networks, either for profit or motivated by the challenge.

32
New cards

hactivists

Have philosophical and political reasons for breaking into systems and will often deface the website as a protest.

33
New cards

HIPAA Security Rule

Ensures national standards for securing patient data that is stored or transferred electronically.

34
New cards

identity theft

Forging someone’s identity for the purpose of fraud.

35
New cards

information security

A broad term encompassing the protection of information from accidental or intentional misuse by persons inside or outside an organization.

36
New cards

information security plan

Details how an organization will implement the information security policies.

37
New cards

information security policies

Identify the rules required to maintain information security, such as requiring users to log off before leaving for lunch or meetings, never sharing passwords with anyone, and changing passwords every 30 days.

38
New cards

insiders

Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident.

39
New cards

intrusion detection software (IDS)

Features full-time monitoring tools that search for patterns in network traffic to identify intruders.

40
New cards

malware

Software that is intended to damage or disable computers and computer systems.

41
New cards

multifactor authentication

Requires more than two means of authentication such as what the user knows (password), what the user has (security token), and what the user is (biometric verification).

42
New cards

network behavior analysis

Gathers an organization's computer network traffic patterns to identify unusual or suspicious operations.

43
New cards

nonsensitive PII

Information transmitted without encryption and includes information collected from public records, phone books, corporate directories, websites, etc.

44
New cards

personally identifiable information (PII)

Any data that could potentially identify a specific individual.

45
New cards

pharming

Reroutes requests for legitimate websites to false websites.

46
New cards

pharming attack

Uses a zombie farm, often by an organized crime association, to launch a massive phishing attack.

47
New cards

phishing

A technique to gain personal information for the purpose of identity theft, usually by means of fraudulent emails that look as though they came from legitimate sources.

48
New cards

public key encryption (PKE)

Encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient.

49
New cards

ransomware

A form of malicious software that infects your computer and asks for money.

50
New cards

scareware

A type of malware designed to trick victims into giving up personal information to purchase or download useless and potentially dangerous software.

51
New cards

script kiddies or script bunnies

Find hacking code on the Internet and click-and-point their way into systems to cause damage or spread viruses.

52
New cards

sensitive PII

Information transmitted with encryption and, when disclosed, results in a breach of an individual's privacy and can potentially cause the individual harm.

53
New cards

single-factor authentication

The traditional security process that requires a user name and password.

54
New cards

smart card

A device that is around the same size as a credit card, containing embedded technologies that can store information and small amounts of software to perform some limited processing.

55
New cards

social engineering

Hackers use their social skills to trick people into revealing access credentials or other valuable information.

56
New cards

spyware

A special class of adware that collects data about the user and transmits it over the Internet without the user’s knowledge or permission.

57
New cards

tokens

Small electronic devices that change user passwords automatically.

58
New cards

two-factor authentication

Requires the user to provide two means of authentication: what the user knows (password) and what the user has (security token).

59
New cards

virus

Software written with malicious intent to cause annoyance or damage.

60
New cards

voiceprint

A set of measurable characteristics of a human voice that uniquely identifies an individual.

61
New cards

white-hat hackers

Work at the request of the system owners to find system vulnerabilities and plug the holes.

62
New cards

worm

Malware computer program that spreads itself not only from file to file but also from computer to compute