Lesson 31: Computer Ethics and Safety Flashcards
Used to protect against unwanted access or use to or form a network
Firewall
For your personal computer. It should not contain personal information such as a name or birthdate
Password
Require more information than a password to authenticate your identity
Two-Step Verifications
Used to block content coming into and going out to the Internet
Filtering
Used to block content coming into and going out to the Internet
Filtering
Refers to any software that is designed to cause damage to a single computer, server, or computer network
Malware
A program that had been written to corrupt data on a computer; attached to a file and spreads from file to file when program is executed
Virus
Makes many copies of itself, so that computer slows down or halts tasks
Worm
Does not cause damage until a specified date or until the system has been launched a certain number of times
Time Bomb
Triggered by the appearance or disappearance of specified data
Logic Bomb
Does something different from what is expected to do; performs one task but is actually doing another task
Trojan Horse
Malicious program that records keystrokes; aids identity theft
Keylogger
Fraudulently installed on a personal computer to collect information about the user
Spyware
A fraudulent attempt to steal information to commit identity theft; comes from a legitimate source and asksa link in the email to update personal info
Phishing
A fraudulent attempt to steal information to commit identity theft; comes from a legitimate source and asks a link in the email to update personal info
Phishing