Module 9 Flashcards
computer virus
a software program installed without the user’s knowledge and designed to alter the way a computer operates or to cause harm to the computer system.
denial of service (DoS) attack
An act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function.
dot con
A fraud or scam carried out through the Internet.
encryption
A method of scrambling electronic content to make it unreadable if it is intercepted by an unauthorized user.
firewall
A collection of hardware and/or software intended to protect a computer or computer network from unauthorized access.
hacking
Using a computer to break into a computing resource
identity theft
Using someone else’s identity to purchase goods or services or otherwise illegally masquerade as that individual.
phishing
The use of spoofed electronic communications (typically e-mail messages) to obtain credit card numbers and other personal data to be used for fraudulent purposes.
trojan horse
A malicious program that masquerades as something else, usually an application program.
uninterruptible power supply (UPS)
A device containing a built-in battery that provides continuous power to a computer and other connected components when the electricity goes out.
computer crime
aka cybercrime; any illegal act involving a computer
information privacy
the rights of individuals and companies to control how the information about them is collected and used
hardware theft
hardware stolen from an individual, business, school, or organization
system failure
the complete malfunction of a computer system
full disk encryption (FDE)
automatically encrypts everything stored on a drive
ruggedized devices
withstand much more physical abuse than a conventional computing device
surge suppressors
protect hardware from damage due to electrical fluctuations
Disaster recovery plan (business continuity plan)
indicates how an organization will recover from a disruptive event
unauthorized access
gaining access to a computer, network, file, or other resource without permission
unauthorized use
using a computer resource for unapproved activities
war driving
driving around an area to find a Wi-Fi network to access and use without authorization
wifi piggybacking
accessing a unsecured Wi-Fi network from the hacker’s current location without authorization
possessed knowledge access systems
use information that only the authorized user should know
biometric access systems
identifies users by a particular, unique biological characteristic
Two-factor authentication
uses two different methods to authenticate users
Private key encryption (symmetric key encryption)
uses one key; most often used to encrypt files on a computer; if used to send files to others, the recipient and sender must agree on private key to be used
Public key encryption (asymmetric key encryption)
uses two keys (private and public) to encrypt and decrypt documents; public key encrypts, private key decrypts; obtained via a certificate authority
computer sabotage
acts of malicious destruction to a computer or computer resources
Passwords
the most common type of possessed knowledge
possessed object access systems
use a physical object an individual has in his/her possession to identify that individual
secure web page
uses encryption to protect information transmitted via that web page
botnet
group of bots (computers controlled by hacker) that are controlled by one individual and work together in a coordinated fashion
malware
any type of malicious software
computer worm
malicious program designed to spread rapidly by sending copies of itself to other computers via a network
security software
typically a suite of programs used to protect your computer from a variety of threats
antivirus software
used to detect and eliminate computer viruses and other types of malware
social media hacking
accessing someone else’s social media account to post comments or send messages as that individual
pharming
the use of spoofed domain names to obtain personal information
online auction fraud
when an item purchased through an online auction is never delivered or is not as specified
digital ID (digital certificate)
group of electronic data that can be used to verify the identify of a person or organization
digital signature
verifies the identity of the individual and guarantees that the document has not been changed
cyber bullying
use of online communication to bully another person
cyber stalking
repeated threats or other malicious behavior that poses a credible threat of harm carried out online
marketing database
contains marketing and demographic data; where people live and what products they buy
government databases
a collection of data about people that the government collects and maintains
electronic profiling
collecting in-depth information about an individual; name; address; income; and buying habits
privacy policy
explains how personal information is used and shared; on most business websites
spam
unsolicited email sent to a large group of individuals at one time
throw-away email address
use for activities that lead to junk email
email filter/spam filter
used to sort email
computer monitoring software
used to monitor someone’s computer activity; can block websites, notify designated party of specific keyword searches or use of inappropriate web sites, can record emails and documents before they are encrypted
video surveillance
use of video cameras to monitor activities
employee monitoring
recording or observing the actions of employees while on the job
presence technology
ability of one computing device to identify another device on the same network and determine its status
T/F: A computer virus can only be transferred to another computer via a storage medium.
false
T/F: An access control system that uses passwords is a possessed knowledge access system.
true
T/F: Using a password that is two characters long is an example of two-factor authentication.
false
T/F: Electronic profiling is the act of using electronic means to collect a variety of in-depth information about an individual, such as name, address, income, and buying habits.
true
T/F: Cyberstalking is the use of spoofed e-mail messages to gain credit card numbers and other personal data to be used for fraudulent purposes.
false
Driving around looking for a Wi-Fi network to access is referred to as____ .
war driving
_____ access control systems use some type of unique physical characteristic of a person to authenticate that individual.
Biometric
A(n) _____ plan can help a business get operational again following a fire, an act of sabotage, or a similar disaster.
disaster recovery or business continuity
A(n) _____ can be added to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been changed.
digital signature
Many businesses today are requiring that all portable computers and mobile-devices issued to employees be ____ in order to protect against a data breach if the device is lost or stolen.
a. ruggedized
b. encrypted
c. formatted
b. encrypted
True or False: The act of breaking into another computer system is called two-factor authentication.
false
A(n) __________ creates a barrier between a computer and the Internet to protect against unauthorized access.
firewall
Sending an e-mail that looks like it came from someone else in order to obtain information for fraudulent purposes is called __________.
a. hacking
b. spamming
c. phishing
c. phishing
True or False: Cyber stalking can lead to online stalking and sometimes even the death of the victim.
true
Using someone else’s identity to purchase goods or services or perform other transactions is called __________.
identity theft
The ability of a computing device to identify another device on the same network and determine its status is called __________.
a. computer monitoring
b. video surveillance
c. presence technology
c. presence technology
True or False: A throw-away e-mail can help to reduce spam.
True
A tool that automatically sorts incoming e-mail messages based on specified criteria is a(n) __________.
email filter