Chapter 5 Flashcards
Digital Security Risk
any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability
Computer Crime
any illegal act involving the use of a computer or related devices
Hacker
someone who accesses a computer or network illegally
Cracker
someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious matter
Script Kiddie
same intent of a cracker but does not have the technical skills and knowledge
Cyberextortionist
someone who demands payment to stop an attack on an organization’s technology infrastructure
Cyberterrorism
someone who uses the Internet or network to destroy or damage computers for political reasons
Cyberwarfare
attack whose goal ranges from disabling a government’s computer network to crippling a country
Malware
programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices
Botnet
group of compromised computers or mobile devices connected to a network
Zombie
one whose owner is unaware the computer or device is being controlled remotely by an outsider
Bot
program that performs a repetitive task on a network
DoS Attack
assault whose purpose is to disrupt computer access to an Internet service
Back Door
program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network
Spoofing
technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
Firewall
hardware and/or software that protects a network’s resources from intrusion by users on another network
Personal Firewall
software firewall that detects and protects a personal computer and its data from unauthorized intrusions
Proxy Server
server outside the organization’s network that controls which communications pass in and out of the organization’s network
Biometric Device
authenticates a person’s identity by translating a personal characteristic
Digital Forensics
discovery, collection, and analysis of evidence found on computers and networks
Software Theft
occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program
Software Piracy
unauthorized and illegal duplication of copyrighted software
License Agreement
right to use software
Single-User license agreement
software purchased by individual users
End-User License Agreement
specific conditions for the use of the software
Network License
legal agreement that allows multiple users to access the software on the server simultaneously
Site License
legal agreement that permits users to install the software on multiple computers
Information Theft
occurs when someone steals personal or confidential information
Encryption
process of converting data that is readable by humans into encoded characters to prevent unauthorized access
Decrypt
decode
Digital Certificate
notice that guarantees a user or a website is legitimate
Digital Signature
encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
Secure Site
website that uses encryption techniques to secure its data
Backup
duplicate of file
Disc Burning Software
writes text, graphics, audio, and video files on a recordable or rewritable disc
Disaster Recovery Plan
written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster
Technology Ethics
moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies
Code of Conduct
written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed
Intellectual Property (IP)
refers to unique and original works
Copywrite
gives authors,a artists, and other creators of original work exclusive rights to duplicate, publish, and sell their materials
Information Technology
right of individuals and companies to deny or restrict the collection, use, and dissemination of information about them
Cookie
small text file that a web server stores on your computer
Content Filtering
process of restricting access to certain materials