Chapter 5 Flashcards
(22 cards)
System Failure
the complete malfunction of a computer system
Hardware theft
When hardware is stolen
Full disk encryption
encrypt everything stored on the drive automatically
Self-encrypting hard drive
Hard drive with FDE
Ruggedized devices
designed to withstand much more physical abuse than most devices
Surge supressor
used to connect a computer to other hardware protect from power fluctuations
Uninterrupted power supply
Used to keep computers powered up when the electricity goes off
digital counterfeiting
creating counterfeit copies of items using digital devices
Marketing databases
contain marketing and demographic data about people
Government databases
Information on others kept by the government
Electronic profiling
collecting in-depth information about an individual
Privacy policy
explains how personal information provided to that company will be used
Spam
unsolicited, bulk email sent over the Internet
Throw away email address
used only for nonessential purposes and activities that may result in spam
Email filter
Automatically sorts your incoming email messages
Spam filter
Email filter used to redirect spam from an inbox
Opt out
to request that you be removed from marketing activities or that your info not be shared
Computer monitoring software
Software that can be used to record computer usage
Video surveullance
The use of video cameras to monitor activities and individuals
Employee monitoring
Observing or reviewing employees’ actions while they are on the job
Presence Technology
enables one computing device to locate and identify the current status of another device on the same network
Disaster recovery plan
A written plan that describes steps a company will take following an occurrence of a disaster