Module 9 Flashcards

1
Q

computer virus

A

a software program installed without the user’s knowledge and designed to alter the way a computer operates or to cause harm to the computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

denial of service (DoS) attack

A

An act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

dot con

A

A fraud or scam carried out through the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

encryption

A

A method of scrambling electronic content to make it unreadable if it is intercepted by an unauthorized user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

firewall

A

A collection of hardware and/or software intended to protect a computer or computer network from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

hacking

A

Using a computer to break into a computing resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

identity theft

A

Using someone else’s identity to purchase goods or services or otherwise illegally masquerade as that individual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

phishing

A

The use of spoofed electronic communications (typically e-mail messages) to obtain credit card numbers and other personal data to be used for fraudulent purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

trojan horse

A

A malicious program that masquerades as something else, usually an application program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

uninterruptible power supply (UPS)

A

A device containing a built-in battery that provides continuous power to a computer and other connected components when the electricity goes out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

computer crime

A

aka cybercrime; any illegal act involving a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

information privacy

A

the rights of individuals and companies to control how the information about them is collected and used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

hardware theft

A

hardware stolen from an individual, business, school, or organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

system failure

A

the complete malfunction of a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

full disk encryption (FDE)

A

automatically encrypts everything stored on a drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ruggedized devices

A

withstand much more physical abuse than a conventional computing device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

surge suppressors

A

protect hardware from damage due to electrical fluctuations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Disaster recovery plan (business continuity plan)

A

indicates how an organization will recover from a disruptive event

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

unauthorized access

A

gaining access to a computer, network, file, or other resource without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

unauthorized use

A

using a computer resource for unapproved activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

war driving

A

driving around an area to find a Wi-Fi network to access and use without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

wifi piggybacking

A

accessing a unsecured Wi-Fi network from the hacker’s current location without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

possessed knowledge access systems

A

use information that only the authorized user should know

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

biometric access systems

A

identifies users by a particular, unique biological characteristic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Two-factor authentication
uses two different methods to authenticate users
26
Private key encryption (symmetric key encryption)
uses one key; most often used to encrypt files on a computer; if used to send files to others, the recipient and sender must agree on private key to be used
27
Public key encryption (asymmetric key encryption)
uses two keys (private and public) to encrypt and decrypt documents; public key encrypts, private key decrypts; obtained via a certificate authority
28
computer sabotage
acts of malicious destruction to a computer or computer resources
29
Passwords
the most common type of possessed knowledge
30
possessed object access systems
use a physical object an individual has in his/her possession to identify that individual
31
secure web page
uses encryption to protect information transmitted via that web page
32
botnet
group of bots (computers controlled by hacker) that are controlled by one individual and work together in a coordinated fashion
33
malware
any type of malicious software
34
computer worm
malicious program designed to spread rapidly by sending copies of itself to other computers via a network
35
security software
typically a suite of programs used to protect your computer from a variety of threats
36
antivirus software
used to detect and eliminate computer viruses and other types of malware
37
social media hacking
accessing someone else’s social media account to post comments or send messages as that individual
38
pharming
the use of spoofed domain names to obtain personal information
39
online auction fraud
when an item purchased through an online auction is never delivered or is not as specified
40
digital ID (digital certificate)
group of electronic data that can be used to verify the identify of a person or organization
41
digital signature
verifies the identity of the individual and guarantees that the document has not been changed
42
cyber bullying
use of online communication to bully another person
43
cyber stalking
repeated threats or other malicious behavior that poses a credible threat of harm carried out online
44
marketing database
contains marketing and demographic data; where people live and what products they buy
45
government databases
a collection of data about people that the government collects and maintains
46
electronic profiling
collecting in-depth information about an individual; name; address; income; and buying habits
47
privacy policy
explains how personal information is used and shared; on most business websites
48
spam
unsolicited email sent to a large group of individuals at one time
49
throw-away email address
use for activities that lead to junk email
50
email filter/spam filter
used to sort email
51
computer monitoring software
used to monitor someone’s computer activity; can block websites, notify designated party of specific keyword searches or use of inappropriate web sites, can record emails and documents before they are encrypted
52
video surveillance
use of video cameras to monitor activities
53
employee monitoring
recording or observing the actions of employees while on the job
54
presence technology
ability of one computing device to identify another device on the same network and determine its status
55
T/F: A computer virus can only be transferred to another computer via a storage medium.
false
56
T/F: An access control system that uses passwords is a possessed knowledge access system.
true
57
T/F: Using a password that is two characters long is an example of two-factor authentication.
false
58
T/F: Electronic profiling is the act of using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits.
true
59
T/F: Cyberstalking is the use of spoofed e-mail messages to gain credit card numbers and other personal data to be used for fraudulent purposes.
false
60
Driving around looking for a Wi-Fi network to access is referred to as____ .
war driving
61
_____ access control systems use some type of unique physical characteristic of a person to authenticate that individual.
Biometric
62
A(n) _____ plan can help a business get operational again following a fire, an act of sabotage, or a similar disaster.
disaster recovery or business continuity
63
A(n) _____ can be added to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been changed.
digital signature
64
Many businesses today are requiring that all portable computers and mobile-devices issued to employees be ____ in order to protect against a data breach if the device is lost or stolen. a. ruggedized b. encrypted c. formatted
b. encrypted
65
True or False: The act of breaking into another computer system is called two-factor authentication.
false
66
A(n) __________ creates a barrier between a computer and the Internet to protect against unauthorized access.
firewall
67
Sending an e-mail that looks like it came from someone else in order to obtain information for fraudulent purposes is called __________. a. hacking b. spamming c. phishing
c. phishing
68
True or False: Cyber stalking can lead to online stalking and sometimes even the death of the victim.
true
69
Using someone else’s identity to purchase goods or services or perform other transactions is called __________.
identity theft
70
The ability of a computing device to identify another device on the same network and determine its status is called __________. a. computer monitoring b. video surveillance c. presence technology
c. presence technology
71
True or False: A throw-away e-mail can help to reduce spam.
True
72
A tool that automatically sorts incoming e-mail messages based on specified criteria is a(n) __________.
email filter