Chapter 5 Flashcards

1
Q

digital security risk

A

A digital security risk is any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

computer crime

A

Any illegal act involving the use of a computer or related devices generally is referred to as a computer crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cyber crime

A

A cybercrime is an online or Internet-based illegal act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

digital security risks

A
Hacker
Cracker
Script kiddie
Corporate spies
Unethical employees
Cyberextortionist
Cyberterrorist
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

cracker

A

is someone who breaks into someone else’s computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

hacker

A

computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

malware

A

short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

aware

A

A program that displays an online advertisement in a banner, pop-up window, or pop-under window on webpages, email messages, or other Internet services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

trojan horse

A

A program that hides within or looks like a legitimate program. Unlike a virus or worm, a trojan horse does not replicate itself to other computers or devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

virus

A

A potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user’s knowledge or permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

worm

A

A program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer, device, or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

botnet

A

A botnet is a group of compromised computers or mobile devices connected to a network
- A compromised computer or device is known as a zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

denial of service attack

A

A denial of service attack (DoS attack) disrupts computer access to an Internet service
Distributed DoS attack (DDoS attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

back door

A

A back door is a program or set of instructions in a program that allow users to bypass security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

spoofing

A

Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

firewall

A

hardware and/or software that protects a network’s resources from intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

unauthorized access

A

use of a computer or network without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

unauthorized use

A

the use of a computer or its data for unapproved or possibily illegal activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Organizations take several measures to help prevent unauthorized access and use

A
  • acceptable use policy

- disable file and printer sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

access controls

A

define who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

passphase

A
is a private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources
A PIN (personal identification number), sometimes called a passcode, is a numeric password, either assigned by a company or selected by a user+
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A PIN (personal identification number)

A

A PIN (personal identification number), sometimes called a passcode, is a numeric password, either assigned by a company or selected by a user+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BIOMETRIC device

A

authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code stored in a computer or mobile device verifying a physical or behavioral characteristic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

hand gemoetry system

A

verifies identity by shape and size of hand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
other forms of idneitifiation
face identifier, finger print scanenr, iris recognition sysmte, signature verification system, voice verification system
26
two step verification
use two separate methods, one after the next to verify the identity of a user
27
digital forensices
the discover, colelction and analysis of evidence found on computers and networks
28
software theft
Steals software media Intentionally erases programs Illegally registers and/or activates a program Illegally copies a program
29
product activiation
which is conducted either online or by phone, users provide the software product’s identification number to associate the software with the computer or mobile device on which the software is installed
30
license agreement
right to use software
31
information theft
occurs when someone steals personal or confidential information
32
typical conditions of a single user-license agreement
You can… Install the software on only one computer or device. (Some license agreements allow users to install the software on a specified number of computers and/or mobile devices) Make one copy of the software as a backup Give or sell the software to another individual, but only if the software is removed from the user’s computer firs
33
encryption
a process of converting data that is readable by humans into encoded characters to prevent unauthorized access
34
digital signature
A digital signature is an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender Often used to ensure that an impostor is not participating in an Internet transaction
35
digital certificate
A digital certificate is a notice that guarantees a user or a website is legitimate
36
secure site
A website that uses encryption techniques to secure its data is known as a secure site
37
hardware theft
act of stealing digital equipment
38
hardware vandalism
incolves defacing or destroying digital ewuipment
39
hardware theft and vandalism safegaurds
Hardware Theft and Vandalism Safeguards Physical access controls (i.e., locked doors and windows) Alarm system Physical security devices (i.e., cables and locks) Devices-tracking app
40
hardware failure safegaurds
``` Hardware Failure Safeguards Surge protector Uninterruptible power supply (UPS) Duplicate components or duplicate computers Fault-tolerant computer ```
41
backup
a duplicate of a file, program, or media that can be used if the original is lost, backup a file means make a copy
42
technology ethics
are the moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies
43
intellectual property (IP)
(IP) refers to unique and original works such as ideas, inventions, art, writings, processes, company and product names, and logos
44
intellectual property rights
Intellectual property rights are the rights to which creators are entitled to their work
45
copyright
A copyright protects any tangible form of expression
46
digital rights management (DRM)
Digital rights management (DRM) is a strategy designed to prevent illegal distribution of movies, music, and other digital content
47
code of conduct
is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed Sample IT Code of Conduct Technology may not be used to harm other people. Employees may not meddle in others’ files Employees may use technology only for purpose in which they have been authorized. Technology may not be used to steal. Technology may not be used to bear false witness
48
information privacy
refers to the right of individuals and companies to deny or restrict the collection, use, and dissemination of information about them
49
green computing
involves reducing the electricity and environmental waste while using computers, mobile devices, and related technologies
50
cookie
small text file that a web browser stores on your computer
51
websites uses cookies for?
``` Allow for personalization Store user names and/or passwords Assist with online shopping Track how often users visit a site Target advertisements ```
52
phishing
is a scam in which a perpetrator sends an official looking message that attempts to obtain your personal and/or financial information
53
clickjacking
an object that can be tapped or clicked on a website contains a malicious program
54
social engineering
is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others
55
content filtering
the process of restricting access to certain material
56
web filtering software
restricts access to specified websites
57
employee monitoring
involves the use of computers, mobile devices, or cameras to observe, record, and review an employee’s use of a technology, including communications such as email messages, keyboard activity (used to measure productivity), and websites visited
58
visual voicemail
direct-access voicemail with a visual interface. Such an interface presents a list of messages for playback, as opposed to the sequential listening required using traditional voicemail, and may include a transcript of each message
59
double click
most cases, a double-click is with the left mouse button and is used to open or execute a file, folder, or software program.
60
right click
The right mouse button is often used to open contextual menus, which are pop-up menus that change depending where you click. - gives you a list of things to do with the file,
61
left click
regular click
62
exampels of optimal disk drive?
compact disk read-only memory (CD-ROM), digital versatile disk read-only memory (DVD-ROM), digital versatile disk random access memory (DVD-RAM), write-once read-many (WORM) cartridges, erasable optical cartridges, and Removable Mass Storage (RMS) media which are removable disk (RDX) and ...
63
ex of operating system
windows, ios,
64
graphical user interface
user interface is a form of user interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, instead of text-based user interfaces, typed command labels or text navigation
65
what is an ISP and what does it do?
Internet Service Provider." An ISP provides access to the Internet.
66
EULAA
an end-user license agreement or software license agreement is the contract between the licensor and purchaser, establishing the purchaser's right to use the software
67
what is included ina software suite?
A software suite record defines the software applications that are included in a software suite, which is licensed as a single unit. For example, an office suite might include applications for spreadsheets, word processing, and presentations. ex. winow as word excel adobe has indesign photop shop , illustrator
68
anatomy of a spreadsheet?
called a worksheet is an arrangement of calls in columns and rows used to organize.
69
shareware vs freeware?
Shareware differs from open-source software, in which the source code is available for anyone to inspect and alter; and freeware, which is software distributed at no cost to the user but without source code being made available.
70
trial software
trial software refers to software which consumers can try before they buy. Trial versions of software usually contain all the functionality of the regular version, but can only be used for a limited time.
71
information processing cycle
the sequence of events in processing information, which includes (1) input, (2) processing, (3) storage and (4) output. The input stage can be further broken down into acquisition, data entry and validation.
72
motherboard
The motherboard is the main printed circuit board in a computer. It holds and allows communication between essential electrical components of a system, such as the CPU and the memory, and provides input connectors.
73
supercomputer
upercomputer is a computer that performs at or near the currently highest operational rate for computers. Traditionally, supercomputers have been used for scientific and engineering applications that must handle very large databases or do a great amount of computation
74
what si a databse query?
Databases store data in a structured format, which can be accessed using queries. In fact, the structured query language (SQL) was designed specifically for this purpose. Users can create SQL queries that retrieve specific information from a database.
75
ultrabook?
n Intel specification and trademark for a line of high-end subnotebook computers featuring reduced bulk without compromising battery life. Ultrabooks use low-power Intel Core processors, solid-state drives, and a unibody chassis to help meet these criteria.