Term Related To Computer Crimes Flashcards

(34 cards)

1
Q

Adware?

A

A type of software that downloads or displays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Backdoor

A

A bit of code of access to a system,bypassed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Biometric identification

A

Fingertips,iris scans, facial recognition and voice recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cracker

A

Hacker ,creates misicheif

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cybercrime

A

Type ,internet or other communication technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data diddling

A

Modfing valid data in a computer file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Denial of service DOS or DDOS

A

Using several computers attached to the internet to access a website so that the site is overwhelmed and not available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption

A

Method od cooding senstive data to protect it when sent over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewall

A

Software ,protect computers from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hacker

A

Computer programmer ,cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Idetity theft

A

Another person private information to assume their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Keyboard logger

A

Mintor computer activites such as time spent on the internet or collect personal information such as password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Logic bomb

A

Program code , program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malware

A

Refer to viruses ,worms ,spyware, trojan horses and adware .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Multifactor

A

Method confroming identify that requires more thean one credential for verication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Authentiction MFA

A

requiring both a password and a code sent by email or text , gusses or steal your password .

17
Q

Malicious data files

A

Office documents or PDF file that exploits weaknesses in the software program used to open it , install malware on a victim system

18
Q

Opt-out

A

A number of measures to prevent reciving unwanted product or services .

19
Q

Phishing

A

Hook users and trick them into submitting personal or financial information or password.

20
Q

Rootkit

A

Enables remote administration-level access and control over a computer or computer network

21
Q

Ransomware

A

Type of malware, money in return for the key to unlocking

22
Q

Sabtoge

A

The puposeful destruction of hardware, software , data

23
Q

Salami method

A

Method of data stealing that invilbes taking little bits at a time

24
Q

Social engineering

A

By humen attackers to get the victims to breach security protocol or give playing on the victim greed ,vanity ,willingness to help someone .

25
Software privacy
Copying of copyrighted software
26
Spamming
Sending unsolicited electronic messeges in bulk
27
Supply chain attacks
Intersting malware code into the legitimate software code utilized on that computer
28
Spoofing
Know and trusted source.
29
Theft of services
Computer system
30
Time bomb
Preform certin functions on a specific date or time such as printing a message or destroying data .
31
Trackers
Website that act to collect information about you and sends that information to third party companies .
32
Trapdoors
Allow a unauthorized access to program
33
Trojan (horse)
Placing instructions in a program that add additional, illegitimate functions
34
Virus
Replicate itself ans causes a verietry of mischievous outcomes,USB storage devices , email attachments and downloded files .