Chapter 5 Flashcards
digital security risk
A digital security risk is any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability
computer crime
Any illegal act involving the use of a computer or related devices generally is referred to as a computer crime
cyber crime
A cybercrime is an online or Internet-based illegal act
digital security risks
Hacker Cracker Script kiddie Corporate spies Unethical employees Cyberextortionist Cyberterrorist
cracker
is someone who breaks into someone else’s computer system, often on a network; bypasses passwords or licenses in computer programs; or in other ways intentionally breaches computer security
hacker
computer hackers are unauthorized users who break into computer systems in order to steal, change or destroy information, often by installing dangerous malware without your knowledge or consent.
malware
short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices
aware
A program that displays an online advertisement in a banner, pop-up window, or pop-under window on webpages, email messages, or other Internet services.
trojan horse
A program that hides within or looks like a legitimate program. Unlike a virus or worm, a trojan horse does not replicate itself to other computers or devices.
virus
A potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user’s knowledge or permission.
worm
A program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer, device, or network.
botnet
A botnet is a group of compromised computers or mobile devices connected to a network
- A compromised computer or device is known as a zombie
denial of service attack
A denial of service attack (DoS attack) disrupts computer access to an Internet service
Distributed DoS attack (DDoS attack)
back door
A back door is a program or set of instructions in a program that allow users to bypass security controls
spoofing
Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate
firewall
hardware and/or software that protects a network’s resources from intrusion
unauthorized access
use of a computer or network without permission
unauthorized use
the use of a computer or its data for unapproved or possibily illegal activities
Organizations take several measures to help prevent unauthorized access and use
- acceptable use policy
- disable file and printer sharing
access controls
define who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it
passphase
is a private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources A PIN (personal identification number), sometimes called a passcode, is a numeric password, either assigned by a company or selected by a user+
A PIN (personal identification number)
A PIN (personal identification number), sometimes called a passcode, is a numeric password, either assigned by a company or selected by a user+
BIOMETRIC device
authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code stored in a computer or mobile device verifying a physical or behavioral characteristic
hand gemoetry system
verifies identity by shape and size of hand
other forms of idneitifiation
face identifier, finger print scanenr, iris recognition sysmte, signature verification system, voice verification system
two step verification
use two separate methods, one after the next to verify the identity of a user
digital forensices
the discover, colelction and analysis of evidence found on computers and networks
software theft
Steals software media
Intentionally erases programs
Illegally registers and/or activates a program
Illegally copies a program
product activiation
which is conducted either online or by phone, users provide the software product’s identification number to associate the software with the computer or mobile device on which the software is installed
license agreement
right to use software