Chapter 11 Flashcards

1
Q

Inappropriate use of computer technology and resources

A

Computer waste

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

4 categories of computer crime

A
  1. Undelivered merchandise or nonpayment
  2. Identity theft
  3. Credit card fraud
  4. Auction fraud
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Using social skills to get computer users to provide information to access an information system

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Going through trash cans / decommissioned storage devices to find secret or confidential information

A

Dumpster diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Learns about and uses computer systems

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Gains unauthorized use or illegal access to computer systems

A

Criminal hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Automates the job of crackers

A

Script bunny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Employee who comprises(made out of) corporate systems

A

Insider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A type of malware that spreads copies of itself from computer to computer

A

Computer worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malicious program that disguises itself as a useful application or game and purposefully does something the user does not expect

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Program file capable of attaching to disks or other files and replicating itself repeatedly

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Set of programs that enable its user to gain administrator level access to a computer or network

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Type of Trojan horse that executes when specific conditions occur

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Small program hidden in a network that records identification numbers and passwords

A

Password sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Act of unauthorized copying or distribution of copyrighted software
Penalties can be severe

A

Software piracy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Occurs when someone makes unauthorized use of another’s patent

A

Patent infringement

17
Q

Why computer crimes act 1997 exists

A
  1. Users can protect their rights to privacy and build trust in the computer system.
  2. The government can have control at a certain level over cyberspace to reduce cyber crime activities.
  3. Gives protection against the misuses of computers and computer criminal activities such as unauthorized use of programs, illegal transmission of data or messages over computers and hacking and cracking of computer systems and networks.
18
Q

Publishing an intentionally false written statement that is damaging to a person’s or organization’s reputation

A

Libel