Discovering Computers - Chapter 5

studied byStudied by 2 people
5.0(1)
Get a hint
Hint

digital security risk

1 / 55

flashcard set

Earn XP

56 Terms

1

digital security risk

any event or action that could cause a loss of/damage to device hardware, software, data, info, or processing capability

New cards
2

computer crime

any illegal act involving the use of a computer

New cards
3

cybercrime

online or Internet-based illegal act

New cards
4

hacker

someone who accesses a computer or network illegally

New cards
5

cracker

someone who accesses a computer or network illegally but has malicious intent

New cards
6

script kiddie

someone who accesses a computer or network illegally with malicious intent, but uses a prewritten code to do so

New cards
7

cyberextortionist

someone who demands payment to stop an attack on an organization’s technology infrastructure

New cards
8

cyberterrorist

someone who uses the Internet/network to damage computers for political reasons

New cards
9

cyberwarfare

use of cyber attacks against an enemy state

New cards
10

malware

programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices

New cards
11

payload

destructive event or prank

New cards
12

botnet (zombie army)

a group of compromised computers connected to a network that are used to attack other networks

New cards
13

zombie

a compromised device, being controlled by someone other than owner

New cards
14

bot

a program that performs a repetitive task on a network

New cards
15

denial of service attack (DoS attack)

an assault whose purpose is to disrupt computer access to an Internet service

New cards
16

distributed DoS attack (DDoS)

attack in which a zombie army is used to attack computers/computer networks

New cards
17

back door

program that allows users to bypass security controls

New cards
18

spoofing

a technique intruders use to make their network appear legit to a victim

New cards
19

IP spoofing

intruder fools network into believing its IP address is trustworthy

New cards
20

email spoofing

when sender’s address/heading is altered so that it appears that the email was from a different sender

New cards
21

firewall

hardware/software that protects a network’s resources from intrusion by users on another network

New cards
22

proxy server

a server outside the organization’s network that controls which communications pass in and out of the organization’s network

New cards
23

AUP

acceptable use policy

New cards
24

audit trail

records successful and unsuccessful attempts to access a computer or network

New cards
25

password manager

service that stores all your account information securely

New cards
26

Which is safer - passwords or passphrases?

passphrases

New cards
27

CAPTCHA

Completely Automated Public Turing test to tell Computers and Humans Apart - distorted letters to verify input is from humans

New cards
28

biometric device

authenticates a person’s identity by translating a personal characteristic (like a fingerprint) into a digital code that is compared w/ a digital code stored in a device

New cards
29

two-step verification

computer uses two separate methods, one after the next, to verify the identity of a user

New cards
30

digital forensics

discovery, collection, and analysis of evidence found on computers and networks

New cards
31

software theft

when someone steals software media, intentionally erases programs, illegally registers/activates a program, or illegally copies a program

New cards
32

software piracy

unauthorized and illegal duplication of copyrighted software

New cards
33

What is the most common form of software theft?

piracy

New cards
34

product activation

ensures software is not installed on more computers than legally licensed

New cards
35

license agreement

the right to use software

New cards
36

network license

a legal agreement that allows multiple users to access the software on the server simultaneously

New cards
37

site license

a legal agreement that permits users to install the software on multiple computers

New cards
38

encryption

the process of converting data that is readable by humans into encoded characters to prevent unauthorized access

New cards
39

virtual private network (VPN)

provides users w/ secure connections to servers, help ensure data is safe from being intercepted by encrypting data as it transmits

New cards
40

digital signature

an encrypted code that a person/website/organization attaches to an e-message to verify the identity of the sender

New cards
41

digital certificate

a notice that guarantees a user/website is legitimate

New cards
42

secure site

a website that uses encryption techniques to secure its data - https

New cards
43

What is the ultimate safeguard to protect data loss?

back up

New cards
44

disc burning software

writes text, graphics, audio, and video files on a recordable disc

New cards
45

differential backup

copies only the files that have changed since the last full backup

New cards
46

incremental backup

copies only the files that have changed since the last full/incremental backup

New cards
47

continuous data protection (CDP)

all data is backed up whenever a change is made

New cards
48

Intellectual Property (IP)

unique and original works

New cards
49

Intellectual Property Rights

rights to which creators are entitled for their work

New cards
50

ENERY star

on devices that comply w/ guidelines of the program - energy efficient

New cards
51

information privacy

the right of individuals and companies to deny or restrict the collection and use of info about them

New cards
52

cookie

small text file that a web server stores on your computer

New cards
53

What are cookies used for?

track user preferences, customize viewing preference, store user names/passwords, target advertisements

New cards
54

Where are cookies stored?

in computer’s hard drive

New cards
55

social engineering

obtaining confidential information by taking advantage of others

New cards
56

rootkit

lets someone from a remote location take full control of your device

New cards

Explore top notes

note Note
studied byStudied by 15 people
... ago
5.0(2)
note Note
studied byStudied by 17 people
... ago
5.0(1)
note Note
studied byStudied by 21 people
... ago
5.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(1)
note Note
studied byStudied by 33 people
... ago
5.0(1)
note Note
studied byStudied by 12 people
... ago
5.0(1)
note Note
studied byStudied by 7 people
... ago
5.0(1)
note Note
studied byStudied by 326 people
... ago
4.0(1)

Explore top flashcards

flashcards Flashcard (45)
studied byStudied by 3 people
... ago
5.0(1)
flashcards Flashcard (55)
studied byStudied by 8 people
... ago
5.0(2)
flashcards Flashcard (81)
studied byStudied by 24 people
... ago
5.0(1)
flashcards Flashcard (198)
studied byStudied by 15 people
... ago
5.0(1)
flashcards Flashcard (46)
studied byStudied by 334 people
... ago
4.2(6)
flashcards Flashcard (43)
studied byStudied by 13 people
... ago
5.0(1)
flashcards Flashcard (67)
studied byStudied by 16 people
... ago
5.0(1)
flashcards Flashcard (41)
studied byStudied by 1 person
... ago
5.0(1)
robot