Computer Security And Safety, Ethics, And Privacy Flashcards
Is any event or action that could cause loss of or damage to computer hardware, software, data, information, or processing capability.
computer security risk
is an online or internet-based illegal act.
cybercrime
a website that evaluates your computer to check for internet and e-mail vulnerabilities.
online security service
Affects a computer negatively by altering the way the computer works.
Computer Virus
Copies itself repeatedly, using up resources and possibly shutting down the computer network.
Worm
A malicious program that hides within or looks like a legitimate program.
Trojan Horse
Program that hides in a computer and allows someone from a remote location to take full control.
Rootkit
a group of compromised computers connected to a network.
botnet
compromised computer
zombie
disrupts computer access to internet services.
denial of service attack(DoS attack)
Is a program or set of instructions in a program that allow users to bypass security controls.
back door
Is a technique intruders use to make their network or internet transmission appear legitimate.
Spoofing
Hardware and /or software that protect a network’s resources from intrusion
firewall
A vulnerable computer that is up to entice an intruder to break into it.
Honeypot
Is the use of a computer or network without permission.
Unauthorized access
Is the use of a computer or its data for unapproved or possibly illegal activities.
Unauthorized use
Authenticates a person’s identity by translating a personal characteristic into a digital code that is compared
biometric device
is the discovery, collection, and analysis of evidence found on computers and networks.
Digital forensics
is the act of stealing computer equipment
Hardware theft
is the act of defacing or destroying computer equipment
Hardware vandalism
Occurs when someone steals software media
Software theft
when someone intentionally erases program
Software theft
Illegally copies a program
Software theft
Illegally registers and/ or activates a program
Software theft
Occurs when someone steals personal or confidential information
Information theft
Is a process of converting readable data into unreadable characters to prevent unauthorized access
Encryption
is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender.
digital signature
is the prolonged malfunction of a computer
system failure