Chapter 5 Terms Flashcards
online or internet based illegal acts such as distributing malicious software or committing identity theft
cybercrime
someone who accesses a computer or network illegally
hacker
someone who accesses a computer or network illegallly with the intent of destroying data, stealing information, or other malicious action
cracker
a potentially damaging computer program that affectrs, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission
virus
malware that resides in active memory and replicates itself over a network to infect machines, using up the system resources and possibly shutting down the system
worm
a destructive program disguised as a real program, such as a screen saver
trojan horse
malware that easily can hide and allow someone to take full control of a computer from a remote location, often for nefarious purposes
rootkit
a group of compromised computers or mobile devices connected to a network such as the internet that are used to attack other networks, usually for nefarious purposes
botnet
a compromised computer or device whose owner is unaware the computer or device is being controled remotely by an outsider
zombie
a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network
back door
hardware and/or software that protect a network’s resources from intrusion by users on another network such as the Internet
firewall
aka AUP; outlines the activities for which a computer and network may and may not be used
AUP
a numeric password; aka personal identification number
PIN
the discovery, collection, and analysis of evidence found on computers and networks
digital forensics
a technique that some software manufactuerers use to ensure that you do not install software on more computers than legally licensed
product activation