Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
26 Cards in this Set
- Front
- Back
Back door
|
Program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
|
|
Back up
|
To make a copy of a file.
|
|
Biometric device
|
Device that authenticates a person's identity by translating a personal characteristic, such as a finger print, into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic.
See page567 |
|
Botnet
|
Group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes
|
|
Computer crime
|
Any illegal act involving a computer.
|
|
Computer ethics
|
Moral guidelines that govern the use of computers and information systems.
|
|
copyright
|
Exclusive rights given to authors and artists to duplicate, publish, and sell their materials.
|
|
cracker
|
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action.
|
|
cybercrime
|
Online or Internet-based illegal acts.
|
|
denial of service attack
|
Assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. Also called denial of service attack.
|
|
digital certificate
|
A notice that guarantees a user or a Web site is legitimate.
|
|
employee monitoring
|
The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.
|
|
encryption
|
Process of converting readable data into unreadable characters to prevent unauthorized access.
|
|
hacker
|
Someone who accesses a computer or network illegally.
|
|
information theft
|
Computer security risk that occurs when someone steals personal or confidential information.
|
|
inoculate
|
Capability of an antivirus program to record information such as file size and file creation date in a separate file in order to detect viruses.
|
|
license agreement
|
An agreement issued by a software manufacturer that gives the user the right to use the software.
|
|
phishing
|
Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information.
|
|
piracy
|
Unauthorized and illegal duplication of copyrighted material.
|
|
quarantine
|
Separate area of a hard disk that holds the infected file until a virus can be removed.
|
|
spam
|
Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once.
|
|
spoofing
|
Technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
|
|
surge protector
|
Device that uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment
|
|
trusted source
|
Company or person a user believes will not send a virus-infected file knowingly.
|
|
unauthorized access
|
Use of a computer or network without permission.
|
|
uninterruptible power supply (UPS)
|
Device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power.
|