Chapter 5 Flashcards
Digital Security Risk
any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability
Computer Crime
any illegal act involving the use of a computer or related devices
Hacker
someone who accesses a computer or network illegally
Cracker
someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious matter
Script Kiddie
same intent of a cracker but does not have the technical skills and knowledge
Cyberextortionist
someone who demands payment to stop an attack on an organization’s technology infrastructure
Cyberterrorism
someone who uses the Internet or network to destroy or damage computers for political reasons
Cyberwarfare
attack whose goal ranges from disabling a government’s computer network to crippling a country
Malware
programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices
Botnet
group of compromised computers or mobile devices connected to a network
Zombie
one whose owner is unaware the computer or device is being controlled remotely by an outsider
Bot
program that performs a repetitive task on a network
DoS Attack
assault whose purpose is to disrupt computer access to an Internet service
Back Door
program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network
Spoofing
technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network
Firewall
hardware and/or software that protects a network’s resources from intrusion by users on another network
Personal Firewall
software firewall that detects and protects a personal computer and its data from unauthorized intrusions