Chapter 5 Terms Flashcards
(39 cards)
online or internet based illegal acts such as distributing malicious software or committing identity theft
cybercrime
someone who accesses a computer or network illegally
hacker
someone who accesses a computer or network illegallly with the intent of destroying data, stealing information, or other malicious action
cracker
a potentially damaging computer program that affectrs, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission
virus
malware that resides in active memory and replicates itself over a network to infect machines, using up the system resources and possibly shutting down the system
worm
a destructive program disguised as a real program, such as a screen saver
trojan horse
malware that easily can hide and allow someone to take full control of a computer from a remote location, often for nefarious purposes
rootkit
a group of compromised computers or mobile devices connected to a network such as the internet that are used to attack other networks, usually for nefarious purposes
botnet
a compromised computer or device whose owner is unaware the computer or device is being controled remotely by an outsider
zombie
a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network
back door
hardware and/or software that protect a network’s resources from intrusion by users on another network such as the Internet
firewall
aka AUP; outlines the activities for which a computer and network may and may not be used
AUP
a numeric password; aka personal identification number
PIN
the discovery, collection, and analysis of evidence found on computers and networks
digital forensics
a technique that some software manufactuerers use to ensure that you do not install software on more computers than legally licensed
product activation
illegal act that occurs when someone steals person or confidential information
information theft
the process of converting data that is readable by human into encoded characters to prevent unauthorized access
encryption
device that uses electrical components to provide a stable current flow and minimize the chances of an overvoltage reaching the computer and other electronic equipment
surge protectors
computer that has duplicate components so that it can continue to operate when one of its main components fails
fault-tolerant computers
aka uninterruptible power supply; a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power
UPS
any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capabilty
digital security risk
software that acts without a user’s knowledge and deliberately alters the computer’s operations;; aka malicious software
malware
technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
spoofing
license agreement included with software purchased by individual users
singler user license