Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
13 Cards in this Set
- Front
- Back
Hardware Problems |
Breakdowns, configuration errors, damage from improper use or crime |
|
Software Problems |
Programming errors, installation errors, unauthorized changes |
|
Wireless Security Challenges |
Radio frequencies are easy to scan |
|
Viruses |
Rogue software program that attaches itself to other software programs or data files in order to be executed |
|
Worms |
Independent computer programs that copy themselves from one computer to other computers over a network |
|
Trojan horse |
Software program that appears to be benign but then does something other than expected |
|
Spyware |
Small programs that install themselves on computers to monitor user web surfing and serve up advertising |
|
Key loggers |
Record every keystroke on computer to steal serial numbers, passwords, launch internet attacks |
|
Identity Theft |
Theft of personal information to impersonate someone else |
|
Phishing |
Setting up fake Web sites or sending e-mail messages that look like legitimate businesses to ask users for confidential personal data |
|
Pharming |
Redirects users to a bogus web page, even when the individual types correct web page address into browser |
|
Patches |
small pieces of software to repair flaws released by vendors |
|
Firewall |
Combination of hardware and software that prevents unauthorized access to network |