Computer Security & Safety, Ethics, & Privacy

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/45

flashcard set

Earn XP

Description and Tags

Flashcards about Computer Security, Safety, Ethics, & Privacy

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

46 Terms

1
New cards

Computer security risk

Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability

2
New cards

Cybercrime

An online or Internet-based illegal act

3
New cards

Computer Virus

Affects a computer negatively by altering the way the computer works

4
New cards

Worm

Copies itself repeatedly, using up resources and possibly shutting down the computer or network

5
New cards

Trojan Horse

A malicious program that hides within or looks like a legitimate program

6
New cards

Rootkit

Program that hides in a computer and allows someone from a remote location to take full control

7
New cards

Botnet

A group of compromised computers connected to a network

8
New cards

Zombie

A compromised computer

9
New cards

Denial of Service Attack (DoS)

Disrupts computer access to Internet services

10
New cards

Back Door

A program or set of instructions in a program that allow users to bypass security controls

11
New cards

Spoofing

A technique intruders use to make their network or Internet transmission appear legitimate

12
New cards

Firewall

Hardware and/or software that protects a network's resources from intrusion

13
New cards

Intrusion detection software

Analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized intrusions, and notifies network administrators of suspicious behavior patterns or system breaches

14
New cards

Honeypot

Vulnerable computer that is set up to entice an intruder to break into it

15
New cards

Unauthorized access

The use of a computer or network without permission

16
New cards

Unauthorized use

The use of a computer or its data for unapproved or possibly illegal activities

17
New cards

Access controls

Define who can access a computer, when they can access it, and what actions they can take

18
New cards

Possessed object

Any item that you must carry to gain access to a computer or computer facility, often used with a PIN

19
New cards

Biometric device

Authenticates a person’s identity by translating a personal characteristic into a digital code

20
New cards

Digital forensics

The discovery, collection, and analysis of evidence found on computers and networks

21
New cards

Hardware theft

The act of stealing computer equipment

22
New cards

Hardware vandalism

The act of defacing or destroying computer equipment

23
New cards

Software theft

Occurs when someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers/activates a program

24
New cards

Information Theft

Occurs when someone steals personal or confidential information

25
New cards

Encryption

A process of converting readable data into unreadable characters to prevent unauthorized access

26
New cards

Digital Signature

An encrypted code that verifies the identity of the sender

27
New cards

Popular security techniques

Security techniques include Digital Certificates, Transport Layer Security (TLS), Secure HTTP, and VPN

28
New cards

System failure

The prolonged malfunction of a computer

29
New cards

Backup

A duplicate of a file, program, or disk used if the original is lost, damaged, or destroyed

30
New cards

War driving

Detect wireless networks while driving a vehicle

31
New cards

Repetitive Strain Injury (RSI), Computer Vision Syndrome (CVS)

Computer-related health concerns

32
New cards

Ergonomics

An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace

33
New cards

Computer addiction

Occurs when the computer consumes someone’s entire social life

34
New cards

Computer ethics

The moral guidelines that govern the use of computers and information systems

35
New cards

Intellectual property rights

The rights to which creators are entitled for their work

36
New cards

IT Code of Conduct

A written guideline that helps determine whether a specific computer action is ethical or unethical

37
New cards

Green Computing

Involves reducing the electricity and environmental waste while using a computer

38
New cards

Information privacy

Refers to the right of individuals and companies to deny or restrict the collection and use of information about them

39
New cards

Cookie

A small text file that a Web server stores on your computer to allow for personalization, store passwords, assist with shopping, track visits, and target ads

40
New cards

Spam

An unsolicited e-mail message or newsgroup posting

41
New cards

Phishing

A scam in which a perpetrator sends an official looking e-mail message to obtain personal and financial information

42
New cards

Pharming

A scam where a perpetrator attempts to obtain your personal and financial information via spoofing

43
New cards

Fair Credit Reporting Act (1970)

Limits the rights of others viewing a credit report to those with a legitimate business need

44
New cards

Social engineering

Gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety

45
New cards

Employee monitoring

Involves the use of computers to observe, record, and review an employee’s use of a computer

46
New cards

Content filtering

The process of restricting access to certain material on the Web