Chapter 5 Terms Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

online or internet based illegal acts such as distributing malicious software or committing identity theft

A

cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

someone who accesses a computer or network illegally

A

hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

someone who accesses a computer or network illegallly with the intent of destroying data, stealing information, or other malicious action

A

cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a potentially damaging computer program that affectrs, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

malware that resides in active memory and replicates itself over a network to infect machines, using up the system resources and possibly shutting down the system

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a destructive program disguised as a real program, such as a screen saver

A

trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

malware that easily can hide and allow someone to take full control of a computer from a remote location, often for nefarious purposes

A

rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a group of compromised computers or mobile devices connected to a network such as the internet that are used to attack other networks, usually for nefarious purposes

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a compromised computer or device whose owner is unaware the computer or device is being controled remotely by an outsider

A

zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network

A

back door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

hardware and/or software that protect a network’s resources from intrusion by users on another network such as the Internet

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

aka AUP; outlines the activities for which a computer and network may and may not be used

A

AUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a numeric password; aka personal identification number

A

PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the discovery, collection, and analysis of evidence found on computers and networks

A

digital forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a technique that some software manufactuerers use to ensure that you do not install software on more computers than legally licensed

A

product activation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

illegal act that occurs when someone steals person or confidential information

A

information theft

17
Q

the process of converting data that is readable by human into encoded characters to prevent unauthorized access

A

encryption

18
Q

device that uses electrical components to provide a stable current flow and minimize the chances of an overvoltage reaching the computer and other electronic equipment

A

surge protectors

19
Q

computer that has duplicate components so that it can continue to operate when one of its main components fails

A

fault-tolerant computers

20
Q

aka uninterruptible power supply; a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power

A

UPS

21
Q

any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capabilty

A

digital security risk

22
Q

software that acts without a user’s knowledge and deliberately alters the computer’s operations;; aka malicious software

A

malware

23
Q

technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network

A

spoofing

24
Q

license agreement included with software purchased by individual users

A

singler user license

25
Q

a legal agreement that allows multiple users to access software on the server simultaneously

A

network license

26
Q

a website that uses encryption techniques to secure its data

A

secure web site

27
Q

a written guidelines that helps determine whether a specific action is ethical/unethical or allowed/not allowed

A

IT code of conduct

28
Q

an unsolicited email message or posting sent to many recipients or forums at once

A

spam

29
Q

a scam in which a perpetrator attempts to obtain your and/or financial information

A

phishing

30
Q

the process of restricting access to certain material

A

content filtering

31
Q

the use of computers, mobile devices, or cameras to observe, record, and review an employee’s use of a technology, including communications such as email messages, keyboard activity, and websites visited

A

employee monitoring

32
Q

a legal agreement that permits users to install software on multiple computers, usually at a volume discount

A

site license

33
Q

Who you purchase software or have something installed, you are allowed to intall it on your computer, but not allowed to give the CD or DVD to another person.
What type of license agreement is this?

A

single-user agreement

34
Q

Companies using a single-user agreement, know by reading a computers ___ ________.

A

IP address

35
Q

If attempted to give someone else a CD or DVD, while using a single-user agreement, what could happen?

A

the DVD or CD could be wiped

36
Q

Cite licenses cost [ MORE or LESS] than individual licenses

A

less

37
Q

What is a cite license?

A

publishers allow organizations to purchase the righrs for software use on multiple computers

38
Q

What is a network license?

A

the software is installed on the server and not individual computers

39
Q

What is the privacy act?

A

a federal law that’s suppossed to prevent organizations from collecting data the company’s don’t need