Chapter 09: Network and Internet Security Flashcards
antivirus software
Software used to detect and eliminate computer viruses and other types of malware. (p369)
Biometric access systems
An access control system that uses one unique physical characteristic of an individual (such as a fingerprint, a face, veins, or a voice) to authenticate that individual. (p354)
bot
A computer that is controlled by a hacker or other computer criminal. (p364)
botnet
A group of bots that are controlled by one individual. (p364)
BYOD
Bring Your Own Device (p363)
code of conduct
Guidelines of acceptable computer use for a school, business, or organization (p348)
computer crimes
Any illegal act involving a computer. (p347)
Computer sabotage
An act of malicious destruction to a computer or computer resource. (p364)
computer virus
A software program installed without the user’s knowledge and designed to alter the way a computer operates or to cause harm to the computer system. (p365)
computer worm
A malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers. (p366)
cyberbullying
Children or teenagers bullying other children or teenagers via the Internet. (p381)
cyberstalking
Repeated threats or harassingbehavior between adults carried out via e-mail or another Internet communications method. (p381)
denial of service (DoS) attack
An act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function. (p367)
digital certificate
A group of electronic data that can be used to verify the identity of a person or organization; includes a key pair that can be used for encryption and digital signatures (also called a digital ID). (p379)
digital ID
A group of electronic data that can be used to verify the identity of a person or organization; includes a key pair that can be used for encryption and digital signatures (also called a digital certificate). (p379)
digital signature
A unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been changed since it was signed. (p380)