Computer Security And Safety, Ethics, And Privacy Flashcards

(72 cards)

1
Q

Is any event or action that could cause loss of or damage to computer hardware, software, data, information, or processing capability.

A

computer security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is an online or internet-based illegal act.

A

cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a website that evaluates your computer to check for internet and e-mail vulnerabilities.

A

online security service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Affects a computer negatively by altering the way the computer works.

A

Computer Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Copies itself repeatedly, using up resources and possibly shutting down the computer network.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A malicious program that hides within or looks like a legitimate program.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Program that hides in a computer and allows someone from a remote location to take full control.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a group of compromised computers connected to a network.

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

compromised computer

A

zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

disrupts computer access to internet services.

A

denial of service attack(DoS attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is a program or set of instructions in a program that allow users to bypass security controls.

A

back door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is a technique intruders use to make their network or internet transmission appear legitimate.

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hardware and /or software that protect a network’s resources from intrusion

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A vulnerable computer that is up to entice an intruder to break into it.

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is the use of a computer or network without permission.

A

Unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is the use of a computer or its data for unapproved or possibly illegal activities.

A

Unauthorized use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Authenticates a person’s identity by translating a personal characteristic into a digital code that is compared

A

biometric device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

is the discovery, collection, and analysis of evidence found on computers and networks.

A

Digital forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is the act of stealing computer equipment

A

Hardware theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

is the act of defacing or destroying computer equipment

A

Hardware vandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Occurs when someone steals software media

A

Software theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

when someone intentionally erases program

A

Software theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Illegally copies a program

A

Software theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Illegally registers and/ or activates a program

A

Software theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Occurs when someone steals personal or confidential information
Information theft
26
Is a process of converting readable data into unreadable characters to prevent unauthorized access
Encryption
27
is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender.
digital signature
28
is the prolonged malfunction of a computer
system failure
29
is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
backup
30
a file means to make a copy of it
back up
31
is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
Ergonomics
32
occurs when the computer consumes someone's entire social life
Computer addiction
33
are the moral guidelines that govern the use of computers and information systems
computer ethics
34
Is a concern | - Not all information on the Web is correct
Information accuracy
35
are the rights to which creators are entitled for their work
Intellectual property rights
36
protects any tangible form of expression
copyright
37
is a written guideline that helps determine whether a specific computer action is ethical or unethical
IT code of conduct
38
involves reducing the electricity and environmental waste while using a computer
Green computing
39
refers to right of individuals and companies to deny or restrict' the collection and use of information about them.
Information privacy
40
is a small text file that a Web server stores on your computer
cookie
41
is an unsolicited e-mail message or newsgroup posting
Spam
42
blocks e-mail messages from designated sources
E-mail filtering
43
attempt to remove spam before it reaches your inbox
Anti-spam programs
44
Is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information
Phishing
45
Is a scam where a perpetrator attempts to obtain your personal and financial information via spoofing
Pharming
46
Limits the rights of others viewing a credit report to only those with a legitimate business need
Fair Credit Reporting Act (1970)
47
Is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety
Social engineering
48
involves the use of computers to observe, record, and review an employee's use of a computer
Employee monitoring
49
is the process of restricting access to certain material on the web
Content filtering
50
restricts access to specified Web sites
Web filtering software
51
is an individual who uses computer networking or other skills to overcome a technical problem.
Hacker
51
is an individual who uses computer networking or other skills to overcome a technical problem.
Hacker
52
Someone who broke into the computer system.
Cracker
53
Disparaging term often used to refer less experience malicious hacker who use existing software to launch hacking attacks.
Script Kiddie
54
Is the unlawful theft/ acquisition of intellectual property, such as key trade secret and patent information as well as industrial manufacturing techniques and process, ideas and formulas.
Corporate spies
55
Behavior is becoming an increasing serious problem for organization. It can take many forms, ranging from theft to disclosure of confidential information to the misrepresentation of products and services.
Unethical Employees
56
Is a person or group of people that participate in cyberextortion
Cyberextortionists
57
Is a computer crime where the extortionist demand payment, goods, or a service to stop an attack on deleted or encrypted data.
Cyber extortion
58
(Cyberspace/ terrorism) Unlawful attacks and threats of attacks against computer, network and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
Cyberterrorists
59
Switch the order of characters.
Transposition
60
Replace characters with other characters
Substitution
61
Insert characters between existing characters
Expansion
62
Remove characters and store elsewhere
Compaction
63
To the center of screen viewing distance 18 to 25 inches
Viewing angle: 20 degrees
64
Elbow at about 9o degrees and arms and hands approximately parallel to the floor.
Arm
65
23 to 28 inches depending on height of user.
Keyboard height
66
define who can access a computer, when they can access it, and what actions they can take
Access controls
66
define who can access a computer, when they can access it, and what actions they can take
Access controls
67
is any item that you must carry to gain access to a computer or computer facility
possessed object
68
uses this in law enforcement, criminal prosecutors, military intelligence, insurance agencies and information security departments
Digital forensics
69
Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law.
Software Theft
70
Often used to ensure that an imposter is not participating in an internet transaction
digital signature