1/45
Flashcards about Computer Security, Safety, Ethics, & Privacy
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Computer security risk
Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
Cybercrime
An online or Internet-based illegal act
Computer Virus
Affects a computer negatively by altering the way the computer works
Worm
Copies itself repeatedly, using up resources and possibly shutting down the computer or network
Trojan Horse
A malicious program that hides within or looks like a legitimate program
Rootkit
Program that hides in a computer and allows someone from a remote location to take full control
Botnet
A group of compromised computers connected to a network
Zombie
A compromised computer
Denial of Service Attack (DoS)
Disrupts computer access to Internet services
Back Door
A program or set of instructions in a program that allow users to bypass security controls
Spoofing
A technique intruders use to make their network or Internet transmission appear legitimate
Firewall
Hardware and/or software that protects a network's resources from intrusion
Intrusion detection software
Analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized intrusions, and notifies network administrators of suspicious behavior patterns or system breaches
Honeypot
Vulnerable computer that is set up to entice an intruder to break into it
Unauthorized access
The use of a computer or network without permission
Unauthorized use
The use of a computer or its data for unapproved or possibly illegal activities
Access controls
Define who can access a computer, when they can access it, and what actions they can take
Possessed object
Any item that you must carry to gain access to a computer or computer facility, often used with a PIN
Biometric device
Authenticates a person’s identity by translating a personal characteristic into a digital code
Digital forensics
The discovery, collection, and analysis of evidence found on computers and networks
Hardware theft
The act of stealing computer equipment
Hardware vandalism
The act of defacing or destroying computer equipment
Software theft
Occurs when someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers/activates a program
Information Theft
Occurs when someone steals personal or confidential information
Encryption
A process of converting readable data into unreadable characters to prevent unauthorized access
Digital Signature
An encrypted code that verifies the identity of the sender
Popular security techniques
Security techniques include Digital Certificates, Transport Layer Security (TLS), Secure HTTP, and VPN
System failure
The prolonged malfunction of a computer
Backup
A duplicate of a file, program, or disk used if the original is lost, damaged, or destroyed
War driving
Detect wireless networks while driving a vehicle
Repetitive Strain Injury (RSI), Computer Vision Syndrome (CVS)
Computer-related health concerns
Ergonomics
An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
Computer addiction
Occurs when the computer consumes someone’s entire social life
Computer ethics
The moral guidelines that govern the use of computers and information systems
Intellectual property rights
The rights to which creators are entitled for their work
IT Code of Conduct
A written guideline that helps determine whether a specific computer action is ethical or unethical
Green Computing
Involves reducing the electricity and environmental waste while using a computer
Information privacy
Refers to the right of individuals and companies to deny or restrict the collection and use of information about them
Cookie
A small text file that a Web server stores on your computer to allow for personalization, store passwords, assist with shopping, track visits, and target ads
Spam
An unsolicited e-mail message or newsgroup posting
Phishing
A scam in which a perpetrator sends an official looking e-mail message to obtain personal and financial information
Pharming
A scam where a perpetrator attempts to obtain your personal and financial information via spoofing
Fair Credit Reporting Act (1970)
Limits the rights of others viewing a credit report to those with a legitimate business need
Social engineering
Gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety
Employee monitoring
Involves the use of computers to observe, record, and review an employee’s use of a computer
Content filtering
The process of restricting access to certain material on the Web