Home
Explore
Exams
Search for anything
Search for anything
Login
Get started
Home
Engineering
Computer Information System
computer crimes quiz
Studied by 21 people
5.0
(3)
Add a rating
Learn
A personalized and smart learning plan
Practice Test
Take a test on your terms and definitions
Spaced Repetition
Scientifically backed study method
Matching Game
How quick can you match all your cards?
Flashcards
Study terms and definitions
1 / 15
Earn XP
Description and Tags
Computer Information System
8th
Add tags
16 Terms
View all (16)
Star these 16
1
Anti-virus Software
software developed to detect and remove viruses
New cards
2
Encryption
transforming data into an unreadable form for security
New cards
3
firewall
hardware that creates a boundary between your computer and internet
New cards
4
spam
unsolicited email or junk mail
New cards
5
port scan
identifying access points into a computer system
New cards
6
hacker
individual who gains unauthorized access to data
New cards
7
virus
harmful or damaging program
New cards
8
time bomb
program that waits for a specific time before causing damage
New cards
9
trojan horse
innocent looking program
New cards
10
worm
self replicating program that sends copies to other computers
New cards
11
internet fraud
illegal use of the internet
New cards
12
data theft
stealing data
New cards
13
sabotage
deliberate damage to operations or equipment
New cards
14
spoofing
using incorrect identification
New cards
15
wiretapping
eavesdropping or intercepting transmissions
New cards
16
zombie
program inserted into a vulnerable system to await further instructions
New cards