Computer Security And Safety, Ethics, And Privacy Flashcards
Is any event or action that could cause loss of or damage to computer hardware, software, data, information, or processing capability.
computer security risk
is an online or internet-based illegal act.
cybercrime
a website that evaluates your computer to check for internet and e-mail vulnerabilities.
online security service
Affects a computer negatively by altering the way the computer works.
Computer Virus
Copies itself repeatedly, using up resources and possibly shutting down the computer network.
Worm
A malicious program that hides within or looks like a legitimate program.
Trojan Horse
Program that hides in a computer and allows someone from a remote location to take full control.
Rootkit
a group of compromised computers connected to a network.
botnet
compromised computer
zombie
disrupts computer access to internet services.
denial of service attack(DoS attack)
Is a program or set of instructions in a program that allow users to bypass security controls.
back door
Is a technique intruders use to make their network or internet transmission appear legitimate.
Spoofing
Hardware and /or software that protect a network’s resources from intrusion
firewall
A vulnerable computer that is up to entice an intruder to break into it.
Honeypot
Is the use of a computer or network without permission.
Unauthorized access
Is the use of a computer or its data for unapproved or possibly illegal activities.
Unauthorized use
Authenticates a person’s identity by translating a personal characteristic into a digital code that is compared
biometric device
is the discovery, collection, and analysis of evidence found on computers and networks.
Digital forensics
is the act of stealing computer equipment
Hardware theft
is the act of defacing or destroying computer equipment
Hardware vandalism
Occurs when someone steals software media
Software theft
when someone intentionally erases program
Software theft
Illegally copies a program
Software theft
Illegally registers and/ or activates a program
Software theft
Occurs when someone steals personal or confidential information
Information theft
Is a process of converting readable data into unreadable characters to prevent unauthorized access
Encryption
is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender.
digital signature
is the prolonged malfunction of a computer
system failure
is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
backup
a file means to make a copy of it
back up
is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
Ergonomics
occurs when the computer consumes someone’s entire social life
Computer addiction
are the moral guidelines that govern the use of computers and information systems
computer ethics
Is a concern
- Not all information on the Web is correct
Information accuracy
are the rights to which creators are entitled for their work
Intellectual property rights
protects any tangible form of expression
copyright
is a written guideline that helps determine whether a specific computer action is ethical or unethical
IT code of conduct
involves reducing the electricity and environmental waste while using a computer
Green computing
refers to right of individuals and companies to deny or restrict’ the collection and use of information about them.
Information privacy
is a small text file that a Web server stores on your computer
cookie
is an unsolicited e-mail message or newsgroup posting
Spam
blocks e-mail messages from designated sources
E-mail filtering
attempt to remove spam before it reaches your inbox
Anti-spam programs
Is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information
Phishing
Is a scam where a perpetrator attempts to obtain your personal and financial information via spoofing
Pharming
Limits the rights of others viewing a credit report to only those with a legitimate business need
Fair Credit Reporting Act (1970)
Is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety
Social engineering
involves the use of computers to observe, record, and review an employee’s use of a computer
Employee monitoring
is the process of restricting access to certain material on the web
Content filtering
restricts access to specified Web sites
Web filtering software
is an individual who uses computer networking or other skills to overcome a technical problem.
Hacker
is an individual who uses computer networking or other skills to overcome a technical problem.
Hacker
Someone who broke into the computer system.
Cracker
Disparaging term often used to refer less experience malicious hacker who use existing software to launch hacking attacks.
Script Kiddie
Is the unlawful theft/ acquisition of intellectual property, such as key trade secret and patent information as well as industrial manufacturing techniques and process, ideas and formulas.
Corporate spies
Behavior is becoming an increasing serious problem for organization. It can take many forms, ranging from theft to disclosure of confidential information to the misrepresentation of products and services.
Unethical Employees
Is a person or group of people that participate in cyberextortion
Cyberextortionists
Is a computer crime where the extortionist demand payment, goods, or a service to stop an attack on deleted or encrypted data.
Cyber extortion
(Cyberspace/ terrorism)
Unlawful attacks and threats of attacks against computer, network and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.
Cyberterrorists
Switch the order of characters.
Transposition
Replace characters with other characters
Substitution
Insert characters between existing characters
Expansion
Remove characters and store elsewhere
Compaction
To the center of screen viewing distance 18 to 25 inches
Viewing angle: 20 degrees
Elbow at about 9o degrees and arms and hands approximately parallel to the floor.
Arm
23 to 28 inches depending on height of user.
Keyboard height
define who can access a computer, when they can access it, and what actions they can take
Access controls
define who can access a computer, when they can access it, and what actions they can take
Access controls
is any item that you must carry to gain access to a computer or computer facility
possessed object
uses this in law enforcement, criminal prosecutors, military intelligence, insurance agencies and information security departments
Digital forensics
Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law.
Software Theft
Often used to ensure that an imposter is not participating in an internet transaction
digital signature