ITGS Ch. 9 1-64 Terms Flashcards
Adware
A program that downloads on your computer when a user installs a freeware program, game, or utility; generally enables sponsored advertisements to appear in a section of a browser window or as a pop-up
Antivirus software
Software specifically designed to detect viruses and protect a computer and files from harm
Backdoor program
Enables a hacker to take complete control of a computer without the legitimate user’s knowledge or permission
Backup
A copy of a computer file that can be used to replace the original if its lost or damaged
Biometric authentication device
Device that uses some unique characteristic of human biology to identify authorized users
Black-hat hacker
A hacker who uses his or her knowledge to destroy information or for illegal gain
Boot-sector virus
A virus that replicates itself into the master boot record of a flash drive or hard drive
Botnet
A large group of software applications (called robots or bots) that run without user intervention on a large number of computers
Computer forensics
The application of computer systems and techniques to gather potential legal evidence; a law enforcement specialty used to fight high-tech crime
Cookie
A small text file that some websites automatically store on a client computer’s hard drive when a user visits the site
Cybercrime
Any criminal action perpetrated primarily through the use of a computer
Cybercriminal
An individual who uses computers, networks, and the Internet to perpetrate crime
Cyberfloating / Cyberslacking
Doing anything with a computer that’s unrelated to a job (such as playing video games) while one’s supposed to be working
Data breach
When sensitive or confidential information is copied, transmitted, or viewed by a individual who is not authorized to handle the data
Data file
A file that contains stored data
Denial-of-service (DoS) attack
An attack that occurs when legitimate users are denied access to a computer system because a hacker is repeatedly making requests of that computer system that tie up its resources and deny legitimate users access
Distributed denial-of-service (DDoS) attack
An automated attack that launched from more than one zombie computer at the same time
Drive-by download
The use of malicious software to attack a computer by downloading harmful programs onto a computer, without the user’s knowledge, while they are surfing a website
E-mail virus
A virus transmitted by e-mail that often uses the address book in the victim’s e-mail system to distribute itself
Encryption virus
A malicious program that searched for common data files and compresses them into a file using a complex encryption key, thereby rendering the files unusable
Firewall
A software program or hardware device designed to prevent unauthorized access to computers or networks
Geotag
Data attached to a photograph that indicates the latitude and longitude where you were standing when you took the photo
Grey-hat hacker
A cross between black and white - a hacker who will often illegally break into systems merely to flaunt his or her expertise to the administrator of the system he or she penetrated or to attempt to sell his or her services in repairing security breaches
Hacker
Anyone who unlawfully breaks into a computer system (whether an individual computer or a network)
Identity theft
The process by which someone uses personal information about someone else (such as the victim’s name, address, and Social Security number) to assume the victim’s identity for the purpose of defrauding another