2024

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Computer Security

1 / 25

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

26 Terms

1

Computer Security

Activities related to identifying, assessing and managing vulnerabilities, threats, and attacks on a computer system.

New cards
2

Vulnerability

Exposure to the possibility of being harmed or attacked.

New cards
3

Threat

A statement of intention to harm.

New cards
4

Attack

Actual action that causes damage or harm.

New cards
5

Countermeasure

An action taken to counteract a threat.

New cards
6

Computer Misuse

Any activity during which a computer system's data is accessed, modified or deleted without proper authorization.

New cards
7

Cyberbullying

A form of harassment or bullying in an online space, which includes insulting comments or sharing embarrassing content.

New cards
8

Identity Theft

The deliberate use of someone else's identity, usually to gain financial advantage.

New cards
9

Phishing Attacks

Attempts to steal sensitive information through fake emails pretending to be from trusted organizations.

New cards
10

Privacy Violations

Breaches of the right of individuals to control their personal information.

New cards
11

Copyright Infringement

Reproducing, distributing, or benefiting from copyrighted works without permission.

New cards
12

Software Piracy

The unauthorized reproduction or distribution of software products.

New cards
13

Data Theft

The unauthorized copying or removal of data from a legitimate owner's computer system.

New cards
14

Denial of Service Attack

A cyber-attack intended to prevent a service being delivered by the target system.

New cards
15

Malware

Software designed to disrupt, damage, or gain unauthorized access to a computer system.

New cards
16

Electronic Eavesdropping

Intercepting communications without knowledge or consent of participants.

New cards
17

Cybercrime

Any crime carried out using computers and networks.

New cards
18

Cybersecurity

Technologies, processes, and practices designed to protect systems from attack, damage, or unauthorized access.

New cards
19

IPO Chart

A diagram that breaks down a problem into Input-Process-Output.

New cards
20

Variable

A container that stores values capable of changing during processing.

New cards
21

Constant

A container with a value that cannot be changed during processing.

New cards
22

Algorithm

A sequence of instructions that defines a solution to a problem.

New cards
23

Relational Operators

Operators that test the relationship between two values and result in true or false.

New cards
24

Arithmetic Operators

Symbols representing mathematical computations like addition, subtraction, multiplication, and division.

New cards
25

Conditional Branching

Performing actions based on specific situations or conditions.

New cards
26

Nested Conditions

Conditional statements within other conditional statements.

New cards

Explore top notes

note Note
studied byStudied by 26 people
... ago
5.0(1)
note Note
studied byStudied by 13 people
... ago
5.0(1)
note Note
studied byStudied by 119 people
... ago
5.0(4)
note Note
studied byStudied by 5 people
... ago
4.0(1)
note Note
studied byStudied by 31 people
... ago
5.0(1)
note Note
studied byStudied by 46 people
... ago
5.0(2)
note Note
studied byStudied by 18 people
... ago
5.0(2)

Explore top flashcards

flashcards Flashcard (36)
studied byStudied by 11 people
... ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 21 people
... ago
5.0(1)
flashcards Flashcard (127)
studied byStudied by 15 people
... ago
5.0(1)
flashcards Flashcard (71)
studied byStudied by 30 people
... ago
5.0(1)
flashcards Flashcard (52)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (20)
studied byStudied by 17 people
... ago
5.0(1)
flashcards Flashcard (48)
studied byStudied by 13 people
... ago
5.0(1)
flashcards Flashcard (69)
studied byStudied by 3 people
... ago
5.0(1)
robot