Module 9 Flashcards
computer virus
a software program installed without the user’s knowledge and designed to alter the way a computer operates or to cause harm to the computer system.
denial of service (DoS) attack
An act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function.
dot con
A fraud or scam carried out through the Internet.
encryption
A method of scrambling electronic content to make it unreadable if it is intercepted by an unauthorized user.
firewall
A collection of hardware and/or software intended to protect a computer or computer network from unauthorized access.
hacking
Using a computer to break into a computing resource
identity theft
Using someone else’s identity to purchase goods or services or otherwise illegally masquerade as that individual.
phishing
The use of spoofed electronic communications (typically e-mail messages) to obtain credit card numbers and other personal data to be used for fraudulent purposes.
trojan horse
A malicious program that masquerades as something else, usually an application program.
uninterruptible power supply (UPS)
A device containing a built-in battery that provides continuous power to a computer and other connected components when the electricity goes out.
computer crime
aka cybercrime; any illegal act involving a computer
information privacy
the rights of individuals and companies to control how the information about them is collected and used
hardware theft
hardware stolen from an individual, business, school, or organization
system failure
the complete malfunction of a computer system
full disk encryption (FDE)
automatically encrypts everything stored on a drive
ruggedized devices
withstand much more physical abuse than a conventional computing device
surge suppressors
protect hardware from damage due to electrical fluctuations
Disaster recovery plan (business continuity plan)
indicates how an organization will recover from a disruptive event
unauthorized access
gaining access to a computer, network, file, or other resource without permission
unauthorized use
using a computer resource for unapproved activities
war driving
driving around an area to find a Wi-Fi network to access and use without authorization
wifi piggybacking
accessing a unsecured Wi-Fi network from the hacker’s current location without authorization
possessed knowledge access systems
use information that only the authorized user should know
biometric access systems
identifies users by a particular, unique biological characteristic
Two-factor authentication
uses two different methods to authenticate users
Private key encryption (symmetric key encryption)
uses one key; most often used to encrypt files on a computer; if used to send files to others, the recipient and sender must agree on private key to be used
Public key encryption (asymmetric key encryption)
uses two keys (private and public) to encrypt and decrypt documents; public key encrypts, private key decrypts; obtained via a certificate authority
computer sabotage
acts of malicious destruction to a computer or computer resources