Chapter 5 Flashcards

1
Q

digital security risk

A

A digital security risk is any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

computer crime

A

Any illegal act involving the use of a computer or related devices generally is referred to as a computer crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cyber crime

A

A cybercrime is an online or Internet-based illegal act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

digital security risks

A
Hacker
Cracker
Script kiddie
Corporate spies
Unethical employees
Cyberextortionist
Cyberterrorist
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

cracker

A

is someone who breaks into someone else’s computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

hacker

A

computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

malware

A

short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

aware

A

A program that displays an online advertisement in a banner, pop-up window, or pop-under window on webpages, email messages, or other Internet services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

trojan horse

A

A program that hides within or looks like a legitimate program. Unlike a virus or worm, a trojan horse does not replicate itself to other computers or devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

virus

A

A potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user’s knowledge or permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

worm

A

A program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer, device, or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

botnet

A

A botnet is a group of compromised computers or mobile devices connected to a network
- A compromised computer or device is known as a zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

denial of service attack

A

A denial of service attack (DoS attack) disrupts computer access to an Internet service
Distributed DoS attack (DDoS attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

back door

A

A back door is a program or set of instructions in a program that allow users to bypass security controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

spoofing

A

Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

firewall

A

hardware and/or software that protects a network’s resources from intrusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

unauthorized access

A

use of a computer or network without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

unauthorized use

A

the use of a computer or its data for unapproved or possibily illegal activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Organizations take several measures to help prevent unauthorized access and use

A
  • acceptable use policy

- disable file and printer sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

access controls

A

define who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

passphase

A
is a private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources
A PIN (personal identification number), sometimes called a passcode, is a numeric password, either assigned by a company or selected by a user+
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A PIN (personal identification number)

A

A PIN (personal identification number), sometimes called a passcode, is a numeric password, either assigned by a company or selected by a user+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

BIOMETRIC device

A

authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code stored in a computer or mobile device verifying a physical or behavioral characteristic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

hand gemoetry system

A

verifies identity by shape and size of hand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

other forms of idneitifiation

A

face identifier, finger print scanenr, iris recognition sysmte, signature verification system, voice verification system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

two step verification

A

use two separate methods, one after the next to verify the identity of a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

digital forensices

A

the discover, colelction and analysis of evidence found on computers and networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

software theft

A

Steals software media
Intentionally erases programs
Illegally registers and/or activates a program
Illegally copies a program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

product activiation

A

which is conducted either online or by phone, users provide the software product’s identification number to associate the software with the computer or mobile device on which the software is installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

license agreement

A

right to use software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

information theft

A

occurs when someone steals personal or confidential information

32
Q

typical conditions of a single user-license agreement

A

You can…
Install the software on only one computer or device. (Some license agreements allow users to install the software on a specified number of computers and/or mobile devices)
Make one copy of the software as a backup
Give or sell the software to another individual, but only if the software is removed from the user’s computer firs

33
Q

encryption

A

a process of converting data that is readable by humans into encoded characters to prevent unauthorized access

34
Q

digital signature

A

A digital signature is an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
Often used to ensure that an impostor is not participating in an Internet transaction

35
Q

digital certificate

A

A digital certificate is a notice that guarantees a user or a website is legitimate

36
Q

secure site

A

A website that uses encryption techniques to secure its data is known as a secure site

37
Q

hardware theft

A

act of stealing digital equipment

38
Q

hardware vandalism

A

incolves defacing or destroying digital ewuipment

39
Q

hardware theft and vandalism safegaurds

A

Hardware Theft and Vandalism Safeguards
Physical access controls (i.e., locked doors and windows)
Alarm system
Physical security devices (i.e., cables and locks)
Devices-tracking app

40
Q

hardware failure safegaurds

A
Hardware Failure Safeguards
Surge protector
Uninterruptible power supply (UPS)
Duplicate components or duplicate computers
Fault-tolerant computer
41
Q

backup

A

a duplicate of a file, program, or media that can be used if the original is lost, backup a file means make a copy

42
Q

technology ethics

A

are the moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies

43
Q

intellectual property (IP)

A

(IP) refers to unique and original works such as ideas, inventions, art, writings, processes, company and product names, and logos

44
Q

intellectual property rights

A

Intellectual property rights are the rights to which creators are entitled to their work

45
Q

copyright

A

A copyright protects any tangible form of expression

46
Q

digital rights management (DRM)

A

Digital rights management (DRM) is a strategy designed to prevent illegal distribution of movies, music, and other digital content

47
Q

code of conduct

A

is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed
Sample IT Code of Conduct
Technology may not be used to harm other people.
Employees may not meddle in others’ files
Employees may use technology only for purpose in which they have been authorized.
Technology may not be used to steal.
Technology may not be used to bear false witness

48
Q

information privacy

A

refers to the right of individuals and companies to deny or restrict the collection, use, and dissemination of information about them

49
Q

green computing

A

involves reducing the electricity and environmental waste while using computers, mobile devices, and related technologies

50
Q

cookie

A

small text file that a web browser stores on your computer

51
Q

websites uses cookies for?

A
Allow for personalization
Store user names and/or passwords
Assist with online shopping
Track how often users visit a site
Target advertisements
52
Q

phishing

A

is a scam in which a perpetrator sends an official looking message that attempts to obtain your personal and/or financial information

53
Q

clickjacking

A

an object that can be tapped or clicked on a website contains a malicious program

54
Q

social engineering

A

is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others

55
Q

content filtering

A

the process of restricting access to certain material

56
Q

web filtering software

A

restricts access to specified websites

57
Q

employee monitoring

A

involves the use of computers, mobile devices, or cameras to observe, record, and review an employee’s use of a technology, including communications such as email messages, keyboard activity (used to measure productivity), and websites visited

58
Q

visual voicemail

A

direct-access voicemail with a visual interface. Such an interface presents a list of messages for playback, as opposed to the sequential listening required using traditional voicemail, and may include a transcript of each message

59
Q

double click

A

most cases, a double-click is with the left mouse button and is used to open or execute a file, folder, or software program.

60
Q

right click

A

The right mouse button is often used to open contextual menus, which are pop-up menus that change depending where you click.
- gives you a list of things to do with the file,

61
Q

left click

A

regular click

62
Q

exampels of optimal disk drive?

A

compact disk read-only memory (CD-ROM), digital versatile disk read-only memory (DVD-ROM), digital versatile disk random access memory (DVD-RAM), write-once read-many (WORM) cartridges, erasable optical cartridges, and Removable Mass Storage (RMS) media which are removable disk (RDX) and …

63
Q

ex of operating system

A

windows, ios,

64
Q

graphical user interface

A

user interface is a form of user interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, instead of text-based user interfaces, typed command labels or text navigation

65
Q

what is an ISP and what does it do?

A

Internet Service Provider.” An ISP provides access to the Internet.

66
Q

EULAA

A

an end-user license agreement or software license agreement is the contract between the licensor and purchaser, establishing the purchaser’s right to use the software

67
Q

what is included ina software suite?

A

A software suite record defines the software applications that are included in a software suite, which is licensed as a single unit. For example, an office suite might include applications for spreadsheets, word processing, and presentations.
ex. winow as word excel
adobe has indesign photop shop , illustrator

68
Q

anatomy of a spreadsheet?

A

called a worksheet is an arrangement of calls in columns and rows used to organize.

69
Q

shareware vs freeware?

A

Shareware differs from open-source software, in which the source code is available for anyone to inspect and alter; and freeware, which is software distributed at no cost to the user but without source code being made available.

70
Q

trial software

A

trial software refers to software which consumers can try before they buy. Trial versions of software usually contain all the functionality of the regular version, but can only be used for a limited time.

71
Q

information processing cycle

A

the sequence of events in processing information, which includes (1) input, (2) processing, (3) storage and (4) output. The input stage can be further broken down into acquisition, data entry and validation.

72
Q

motherboard

A

The motherboard is the main printed circuit board in a computer. It holds and allows communication between essential electrical components of a system, such as the CPU and the memory, and provides input connectors.

73
Q

supercomputer

A

upercomputer is a computer that performs at or near the currently highest operational rate for computers. Traditionally, supercomputers have been used for scientific and engineering applications that must handle very large databases or do a great amount of computation

74
Q

what si a databse query?

A

Databases store data in a structured format, which can be accessed using queries. In fact, the structured query language (SQL) was designed specifically for this purpose. Users can create SQL queries that retrieve specific information from a database.

75
Q

ultrabook?

A

n Intel specification and trademark for a line of high-end subnotebook computers featuring reduced bulk without compromising battery life. Ultrabooks use low-power Intel Core processors, solid-state drives, and a unibody chassis to help meet these criteria.