Term Related To Computer Crimes Flashcards

1
Q

Adware?

A

A type of software that downloads or displays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Backdoor

A

A bit of code of access to a system,bypassed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Biometric identification

A

Fingertips,iris scans, facial recognition and voice recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cracker

A

Hacker ,creates misicheif

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cybercrime

A

Type ,internet or other communication technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data diddling

A

Modfing valid data in a computer file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Denial of service DOS or DDOS

A

Using several computers attached to the internet to access a website so that the site is overwhelmed and not available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption

A

Method od cooding senstive data to protect it when sent over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewall

A

Software ,protect computers from unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hacker

A

Computer programmer ,cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Idetity theft

A

Another person private information to assume their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Keyboard logger

A

Mintor computer activites such as time spent on the internet or collect personal information such as password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Logic bomb

A

Program code , program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malware

A

Refer to viruses ,worms ,spyware, trojan horses and adware .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Multifactor

A

Method confroming identify that requires more thean one credential for verication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Authentiction MFA

A

requiring both a password and a code sent by email or text , gusses or steal your password .

17
Q

Malicious data files

A

Office documents or PDF file that exploits weaknesses in the software program used to open it , install malware on a victim system

18
Q

Opt-out

A

A number of measures to prevent reciving unwanted product or services .

19
Q

Phishing

A

Hook users and trick them into submitting personal or financial information or password.

20
Q

Rootkit

A

Enables remote administration-level access and control over a computer or computer network

21
Q

Ransomware

A

Type of malware, money in return for the key to unlocking

22
Q

Sabtoge

A

The puposeful destruction of hardware, software , data

23
Q

Salami method

A

Method of data stealing that invilbes taking little bits at a time

24
Q

Social engineering

A

By humen attackers to get the victims to breach security protocol or give playing on the victim greed ,vanity ,willingness to help someone .

25
Q

Software privacy

A

Copying of copyrighted software

26
Q

Spamming

A

Sending unsolicited electronic messeges in bulk

27
Q

Supply chain attacks

A

Intersting malware code into the legitimate software code utilized on that computer

28
Q

Spoofing

A

Know and trusted source.

29
Q

Theft of services

A

Computer system

30
Q

Time bomb

A

Preform certin functions on a specific date or time such as printing a message or destroying data .

31
Q

Trackers

A

Website that act to collect information about you and sends that information to third party companies .

32
Q

Trapdoors

A

Allow a unauthorized access to program

33
Q

Trojan (horse)

A

Placing instructions in a program that add additional, illegitimate functions

34
Q

Virus

A

Replicate itself ans causes a verietry of mischievous outcomes,USB storage devices , email attachments and downloded files .