Discovering Computers - Chapter 5

5.0(1)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/55

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

56 Terms

1
New cards
digital security risk
any event or action that could cause a loss of/damage to device hardware, software, data, info, or processing capability
2
New cards
computer crime
any illegal act involving the use of a computer
3
New cards
cybercrime
online or Internet-based illegal act
4
New cards
hacker
someone who accesses a computer or network illegally
5
New cards
cracker
someone who accesses a computer or network illegally but has malicious intent
6
New cards
script kiddie
someone who accesses a computer or network illegally with malicious intent, but uses a prewritten code to do so
7
New cards
cyberextortionist
someone who demands payment to stop an attack on an organization’s technology infrastructure
8
New cards
cyberterrorist
someone who uses the Internet/network to damage computers for political reasons
9
New cards
cyberwarfare
use of cyber attacks against an enemy state
10
New cards
malware
programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices
11
New cards
payload
destructive event or prank
12
New cards
botnet (zombie army)
a group of compromised computers connected to a network that are used to attack other networks
13
New cards
zombie
a compromised device, being controlled by someone other than owner
14
New cards
bot
a program that performs a repetitive task on a network
15
New cards
denial of service attack (DoS attack)
an assault whose purpose is to disrupt computer access to an Internet service
16
New cards
distributed DoS attack (DDoS)
attack in which a zombie army is used to attack computers/computer networks
17
New cards
back door
program that allows users to bypass security controls
18
New cards
spoofing
a technique intruders use to make their network appear legit to a victim
19
New cards
IP spoofing
intruder fools network into believing its IP address is trustworthy
20
New cards
email spoofing
when sender’s address/heading is altered so that it appears that the email was from a different sender
21
New cards
firewall
hardware/software that protects a network’s resources from intrusion by users on another network
22
New cards
proxy server
a server outside the organization’s network that controls which communications pass in and out of the organization’s network
23
New cards
AUP
acceptable use policy
24
New cards
audit trail
records successful and unsuccessful attempts to access a computer or network
25
New cards
password manager
service that stores all your account information securely
26
New cards
Which is safer - passwords or passphrases?
passphrases
27
New cards
CAPTCHA
Completely Automated Public Turing test to tell Computers and Humans Apart - distorted letters to verify input is from humans
28
New cards
biometric device
authenticates a person’s identity by translating a personal characteristic (like a fingerprint) into a digital code that is compared w/ a digital code stored in a device
29
New cards
two-step verification
computer uses two separate methods, one after the next, to verify the identity of a user
30
New cards
digital forensics
discovery, collection, and analysis of evidence found on computers and networks
31
New cards
software theft
when someone steals software media, intentionally erases programs, illegally registers/activates a program, or illegally copies a program
32
New cards
software piracy
unauthorized and illegal duplication of copyrighted software
33
New cards
What is the most common form of software theft?
piracy
34
New cards
product activation
ensures software is not installed on more computers than legally licensed
35
New cards
license agreement
the right to use software
36
New cards
network license
a legal agreement that allows multiple users to access the software on the server simultaneously
37
New cards
site license
a legal agreement that permits users to install the software on multiple computers
38
New cards
encryption
the process of converting data that is readable by humans into encoded characters to prevent unauthorized access
39
New cards
virtual private network (VPN)
provides users w/ secure connections to servers, help ensure data is safe from being intercepted by encrypting data as it transmits
40
New cards
digital signature
an encrypted code that a person/website/organization attaches to an e-message to verify the identity of the sender
41
New cards
digital certificate
a notice that guarantees a user/website is legitimate
42
New cards
secure site
a website that uses encryption techniques to secure its data - https
43
New cards
What is the ultimate safeguard to protect data loss?
back up
44
New cards
disc burning software
writes text, graphics, audio, and video files on a recordable disc
45
New cards
differential backup
copies only the files that have changed since the last full backup
46
New cards
incremental backup
copies only the files that have changed since the last full/incremental backup
47
New cards
continuous data protection (CDP)
all data is backed up whenever a change is made
48
New cards
Intellectual Property (IP)
unique and original works
49
New cards
Intellectual Property Rights
rights to which creators are entitled for their work
50
New cards
ENERY star
on devices that comply w/ guidelines of the program - energy efficient
51
New cards
information privacy
the right of individuals and companies to deny or restrict the collection and use of info about them
52
New cards
cookie
small text file that a web server stores on your computer
53
New cards
What are cookies used for?
track user preferences, customize viewing preference, store user names/passwords, target advertisements
54
New cards
Where are cookies stored?
in computer’s hard drive
55
New cards
social engineering
obtaining confidential information by taking advantage of others
56
New cards
rootkit
lets someone from a remote location take full control of your device