Chapter 5 Flashcards

1
Q

Digital Security Risk

A

any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer Crime

A

any illegal act involving the use of a computer or related devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hacker

A

someone who accesses a computer or network illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cracker

A

someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious matter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Script Kiddie

A

same intent of a cracker but does not have the technical skills and knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cyberextortionist

A

someone who demands payment to stop an attack on an organization’s technology infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cyberterrorism

A

someone who uses the Internet or network to destroy or damage computers for political reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cyberwarfare

A

attack whose goal ranges from disabling a government’s computer network to crippling a country

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware

A

programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Botnet

A

group of compromised computers or mobile devices connected to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Zombie

A

one whose owner is unaware the computer or device is being controlled remotely by an outsider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bot

A

program that performs a repetitive task on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DoS Attack

A

assault whose purpose is to disrupt computer access to an Internet service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Back Door

A

program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spoofing

A

technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Firewall

A

hardware and/or software that protects a network’s resources from intrusion by users on another network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Personal Firewall

A

software firewall that detects and protects a personal computer and its data from unauthorized intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Proxy Server

A

server outside the organization’s network that controls which communications pass in and out of the organization’s network

19
Q

Biometric Device

A

authenticates a person’s identity by translating a personal characteristic

20
Q

Digital Forensics

A

discovery, collection, and analysis of evidence found on computers and networks

21
Q

Software Theft

A

occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program

22
Q

Software Piracy

A

unauthorized and illegal duplication of copyrighted software

23
Q

License Agreement

A

right to use software

24
Q

Single-User license agreement

A

software purchased by individual users

25
Q

End-User License Agreement

A

specific conditions for the use of the software

26
Q

Network License

A

legal agreement that allows multiple users to access the software on the server simultaneously

27
Q

Site License

A

legal agreement that permits users to install the software on multiple computers

28
Q

Information Theft

A

occurs when someone steals personal or confidential information

29
Q

Encryption

A

process of converting data that is readable by humans into encoded characters to prevent unauthorized access

30
Q

Decrypt

A

decode

31
Q

Digital Certificate

A

notice that guarantees a user or a website is legitimate

32
Q

Digital Signature

A

encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender

33
Q

Secure Site

A

website that uses encryption techniques to secure its data

34
Q

Backup

A

duplicate of file

35
Q

Disc Burning Software

A

writes text, graphics, audio, and video files on a recordable or rewritable disc

36
Q

Disaster Recovery Plan

A

written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster

37
Q

Technology Ethics

A

moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies

38
Q

Code of Conduct

A

written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed

39
Q

Intellectual Property (IP)

A

refers to unique and original works

40
Q

Copywrite

A

gives authors,a artists, and other creators of original work exclusive rights to duplicate, publish, and sell their materials

41
Q

Information Technology

A

right of individuals and companies to deny or restrict the collection, use, and dissemination of information about them

42
Q

Cookie

A

small text file that a web server stores on your computer

43
Q

Content Filtering

A

process of restricting access to certain materials