Morley Ch 4, 5, and 8 MC Flashcards
Computer crime is sometimes referred to as ____.
cybercrime
____ occurs whenever an individual gains access to a computer, network, file, or other resource without permission.
unoauthorized access
____ refers to the act of breaking into a computer or network.
hacking
____ are sets of tools that allow hackers to access a system.
Rootkits
Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.
war driving
The term ____ refers to accessing someone else’s unsecured Wi-Fi network from the hacker’s current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).
Wi-Fi piggybacking
____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.
Passwords
____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.
Possessed Object
Increasingly, USB security keys, also called USB security ____—USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features—are being used.
tokens
____ identify users by a particular unique biological characteristic.
Biometric access systems
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.
firewall
____ uses a single secret key to both encrypt and decrypt the file or message.
Private key encryption
Some Web-based encrypted e-mail systems—such as the popular free ____ service—require both the sender and recipient to have accounts through that system.
Hushmail
A ____ provides a secure private tunnel from the user’s computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company
Virtual private network
____ are acts of malicious destruction to a computer or computer resource.
Computer sabatoge
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.
bot
____ is a generic term that refers to any type of malicious software.
Malware
A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.
virus
Like a computer virus, a ____ is a malicious program designed to cause damage.
computer worm
A ____ is a malicious program that masquerades as something else—usually as some type of application program.
trojan horse
A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.
computer worm
One emerging type of Trojan horse is called a ____-Access Trojan.
Remote
A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.
dot cons
____ occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities—usually to buy products or services in that person’s name.
Identity theft
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.
virus definitions
____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.
Identity theft
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.
typosquatting
____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.
Pharming
The best protection against many dot cons is ____.
common sense
Repeated threats or other harassment carried out online between adults is referred to as ____.
cyberstalking
Our networked society has raised a number of ____ concerns.
privacy
Hardware loss, as well as other security issues, can result from hardware damage (both intentional and accidental) and ____.
system failure
Although many of us may prefer not to think about it, ____—the complete malfunction of a computer system—and other types of computer-related disasters do happen.
system failure
To facilitate using a computer lock, nearly all computers today come with a ____—a small opening built into the system unit case designed for computer locks.
security slot
____ can be used to secure portable computers, external hard drives, and other portable pieces of hardware to a table or other object.
Cable locks