Computer Security And Safety, Ethics, And Privacy Flashcards

1
Q

Is any event or action that could cause loss of or damage to computer hardware, software, data, information, or processing capability.

A

computer security risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

is an online or internet-based illegal act.

A

cybercrime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a website that evaluates your computer to check for internet and e-mail vulnerabilities.

A

online security service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Affects a computer negatively by altering the way the computer works.

A

Computer Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Copies itself repeatedly, using up resources and possibly shutting down the computer network.

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A malicious program that hides within or looks like a legitimate program.

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Program that hides in a computer and allows someone from a remote location to take full control.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

a group of compromised computers connected to a network.

A

botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

compromised computer

A

zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

disrupts computer access to internet services.

A

denial of service attack(DoS attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is a program or set of instructions in a program that allow users to bypass security controls.

A

back door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Is a technique intruders use to make their network or internet transmission appear legitimate.

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Hardware and /or software that protect a network’s resources from intrusion

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A vulnerable computer that is up to entice an intruder to break into it.

A

Honeypot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is the use of a computer or network without permission.

A

Unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is the use of a computer or its data for unapproved or possibly illegal activities.

A

Unauthorized use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Authenticates a person’s identity by translating a personal characteristic into a digital code that is compared

A

biometric device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

is the discovery, collection, and analysis of evidence found on computers and networks.

A

Digital forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

is the act of stealing computer equipment

A

Hardware theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

is the act of defacing or destroying computer equipment

A

Hardware vandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Occurs when someone steals software media

A

Software theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

when someone intentionally erases program

A

Software theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Illegally copies a program

A

Software theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Illegally registers and/ or activates a program

A

Software theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Occurs when someone steals personal or confidential information

A

Information theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Is a process of converting readable data into unreadable characters to prevent unauthorized access

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender.

A

digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

is the prolonged malfunction of a computer

A

system failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed

A

backup

30
Q

a file means to make a copy of it

A

back up

31
Q

is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace

A

Ergonomics

32
Q

occurs when the computer consumes someone’s entire social life

A

Computer addiction

33
Q

are the moral guidelines that govern the use of computers and information systems

A

computer ethics

34
Q

Is a concern

- Not all information on the Web is correct

A

Information accuracy

35
Q

are the rights to which creators are entitled for their work

A

Intellectual property rights

36
Q

protects any tangible form of expression

A

copyright

37
Q

is a written guideline that helps determine whether a specific computer action is ethical or unethical

A

IT code of conduct

38
Q

involves reducing the electricity and environmental waste while using a computer

A

Green computing

39
Q

refers to right of individuals and companies to deny or restrict’ the collection and use of information about them.

A

Information privacy

40
Q

is a small text file that a Web server stores on your computer

A

cookie

41
Q

is an unsolicited e-mail message or newsgroup posting

A

Spam

42
Q

blocks e-mail messages from designated sources

A

E-mail filtering

43
Q

attempt to remove spam before it reaches your inbox

A

Anti-spam programs

44
Q

Is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information

A

Phishing

45
Q

Is a scam where a perpetrator attempts to obtain your personal and financial information via spoofing

A

Pharming

46
Q

Limits the rights of others viewing a credit report to only those with a legitimate business need

A

Fair Credit Reporting Act (1970)

47
Q

Is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety

A

Social engineering

48
Q

involves the use of computers to observe, record, and review an employee’s use of a computer

A

Employee monitoring

49
Q

is the process of restricting access to certain material on the web

A

Content filtering

50
Q

restricts access to specified Web sites

A

Web filtering software

51
Q

is an individual who uses computer networking or other skills to overcome a technical problem.

A

Hacker

51
Q

is an individual who uses computer networking or other skills to overcome a technical problem.

A

Hacker

52
Q

Someone who broke into the computer system.

A

Cracker

53
Q

Disparaging term often used to refer less experience malicious hacker who use existing software to launch hacking attacks.

A

Script Kiddie

54
Q

Is the unlawful theft/ acquisition of intellectual property, such as key trade secret and patent information as well as industrial manufacturing techniques and process, ideas and formulas.

A

Corporate spies

55
Q

Behavior is becoming an increasing serious problem for organization. It can take many forms, ranging from theft to disclosure of confidential information to the misrepresentation of products and services.

A

Unethical Employees

56
Q

Is a person or group of people that participate in cyberextortion

A

Cyberextortionists

57
Q

Is a computer crime where the extortionist demand payment, goods, or a service to stop an attack on deleted or encrypted data.

A

Cyber extortion

58
Q

(Cyberspace/ terrorism)
Unlawful attacks and threats of attacks against computer, network and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.

A

Cyberterrorists

59
Q

Switch the order of characters.

A

Transposition

60
Q

Replace characters with other characters

A

Substitution

61
Q

Insert characters between existing characters

A

Expansion

62
Q

Remove characters and store elsewhere

A

Compaction

63
Q

To the center of screen viewing distance 18 to 25 inches

A

Viewing angle: 20 degrees

64
Q

Elbow at about 9o degrees and arms and hands approximately parallel to the floor.

A

Arm

65
Q

23 to 28 inches depending on height of user.

A

Keyboard height

66
Q

define who can access a computer, when they can access it, and what actions they can take

A

Access controls

66
Q

define who can access a computer, when they can access it, and what actions they can take

A

Access controls

67
Q

is any item that you must carry to gain access to a computer or computer facility

A

possessed object

68
Q

uses this in law enforcement, criminal prosecutors, military intelligence, insurance agencies and information security departments

A

Digital forensics

69
Q

Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law.

A

Software Theft

70
Q

Often used to ensure that an imposter is not participating in an internet transaction

A

digital signature