Chapter 5 Flashcards

(43 cards)

1
Q

Digital Security Risk

A

any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer Crime

A

any illegal act involving the use of a computer or related devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hacker

A

someone who accesses a computer or network illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cracker

A

someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious matter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Script Kiddie

A

same intent of a cracker but does not have the technical skills and knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cyberextortionist

A

someone who demands payment to stop an attack on an organization’s technology infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cyberterrorism

A

someone who uses the Internet or network to destroy or damage computers for political reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cyberwarfare

A

attack whose goal ranges from disabling a government’s computer network to crippling a country

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware

A

programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Botnet

A

group of compromised computers or mobile devices connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Zombie

A

one whose owner is unaware the computer or device is being controlled remotely by an outsider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bot

A

program that performs a repetitive task on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DoS Attack

A

assault whose purpose is to disrupt computer access to an Internet service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Back Door

A

program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spoofing

A

technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Firewall

A

hardware and/or software that protects a network’s resources from intrusion by users on another network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Personal Firewall

A

software firewall that detects and protects a personal computer and its data from unauthorized intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Proxy Server

A

server outside the organization’s network that controls which communications pass in and out of the organization’s network

19
Q

Biometric Device

A

authenticates a person’s identity by translating a personal characteristic

20
Q

Digital Forensics

A

discovery, collection, and analysis of evidence found on computers and networks

21
Q

Software Theft

A

occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program

22
Q

Software Piracy

A

unauthorized and illegal duplication of copyrighted software

23
Q

License Agreement

A

right to use software

24
Q

Single-User license agreement

A

software purchased by individual users

25
End-User License Agreement
specific conditions for the use of the software
26
Network License
legal agreement that allows multiple users to access the software on the server simultaneously
27
Site License
legal agreement that permits users to install the software on multiple computers
28
Information Theft
occurs when someone steals personal or confidential information
29
Encryption
process of converting data that is readable by humans into encoded characters to prevent unauthorized access
30
Decrypt
decode
31
Digital Certificate
notice that guarantees a user or a website is legitimate
32
Digital Signature
encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
33
Secure Site
website that uses encryption techniques to secure its data
34
Backup
duplicate of file
35
Disc Burning Software
writes text, graphics, audio, and video files on a recordable or rewritable disc
36
Disaster Recovery Plan
written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster
37
Technology Ethics
moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies
38
Code of Conduct
written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed
39
Intellectual Property (IP)
refers to unique and original works
40
Copywrite
gives authors,a artists, and other creators of original work exclusive rights to duplicate, publish, and sell their materials
41
Information Technology
right of individuals and companies to deny or restrict the collection, use, and dissemination of information about them
42
Cookie
small text file that a web server stores on your computer
43
Content Filtering
process of restricting access to certain materials