Untitled
50 Questions
3 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

A_____________________ is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability

computer security risk

Affects a computer negatively by altering the way the computer works

virus

Program that hides in a computer and allows someone from a remote location to take full control

Rootkit

A___________ is an online or Internet-based illegal act

<p>cybercrime</p> Signup and view all the answers

a person who breaks into computer system

<p>Hacker</p> Signup and view all the answers

a person often steal, delete, corrupt, or compromise data

<p>Crackers</p> Signup and view all the answers

A ________ is a group of compromised computers connected to a network

<p>botnet</p> Signup and view all the answers

A compromised computer is known

<p>zombie</p> Signup and view all the answers

A _______________________ disrupts computer access to Internet services

<p>denial of service attack (DoS attack)</p> Signup and view all the answers

A ____________ is a program or set of instructions in a program that allow users to bypass security controls

<p>back door</p> Signup and view all the answers

___________ is a technique intruders use to make their network or Internet transmission appear legitimate

<p>Spoofing</p> Signup and view all the answers

A ________ is hardware and/or software that protects a network’s resources from intrusion

<p>firewall</p> Signup and view all the answers

Copies itself repeatedly, using up resources and possibly shutting down the computer or network

<p>Worm</p> Signup and view all the answers

A malicious program that hides within or looks like a legitimate program

<p>Trojan Horse</p> Signup and view all the answers

Is the use of the internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation.

<p>Cyberterrorist</p> Signup and view all the answers

Analyzes all network traffic. Assesses system vulnerabilities. Identifies any unauthorized intrusions. Notifies network administrators of suspicious behavior patterns or security breaches

<p>Intrusion Detection Software</p> Signup and view all the answers

_____________ is the use of a computer or network without permission

<p>Unauthorized access</p> Signup and view all the answers

is the use of a computer or its data for unapproved or possibly illegal activities

<p>Unauthorized use</p> Signup and view all the answers

Two-phase processes called

<p>Identification and Authentication</p> Signup and view all the answers

A______________ authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer

<p>biometric device</p> Signup and view all the answers

_____________ is the discovery, collection, and analysis of evidence found on computers and networks

<p>Digital forensics</p> Signup and view all the answers

is the act of stealing computer equipment

<p>Hardware theft</p> Signup and view all the answers

is the act of defacing or destroying computer equipment

<p>Hardware vandalism</p> Signup and view all the answers

Copying, loaning, borrowing, renting, or distributing software can be a violation of _______________

<p>copyright law</p> Signup and view all the answers

___________occurs when someone steals personal or confidential information

<p>Information theft</p> Signup and view all the answers

is a process of converting readable data into unreadable characters to prevent unauthorized access

<p>Encryption</p> Signup and view all the answers

is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender

<p>Digital Signature</p> Signup and view all the answers

is a notice that guarantees a user or a Web site is legitimate

<p>Digital Certificate</p> Signup and view all the answers

A_____________is the prolonged malfunction of a computer

<p>system failure</p> Signup and view all the answers

is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed

<p>Backup</p> Signup and view all the answers

Two categories of backups:

<p>full backup and selective backup</p> Signup and view all the answers

allows individuals to detect wireless networks while driving a vehicle through the area

<p>War driving</p> Signup and view all the answers

The widespread use of computers has led to health concerns such as what?

<p>Repetitive Strain Injury (RSI) Computer Vision Syndrome (CVS)</p> Signup and view all the answers

is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace

<p>Ergonomics</p> Signup and view all the answers

occurs when the computer consumes someone’s entire social life

<p>Computer addiction</p> Signup and view all the answers

the moral guidelines that govern the use of computers and information systems

<p>Computer Ethics</p> Signup and view all the answers

are the rights to which creators are entitled for their work

<p>Intellectual property rights</p> Signup and view all the answers

is a strategy designed to prevent illegal distribution of movies, music, and other digital content

<p>Digital rights management</p> Signup and view all the answers

involves reducing the electricity and environmental waste while using a computer

<p>Green Computing</p> Signup and view all the answers

refers to the right of individuals and companies to deny or restrict the collection and use of information about them

<p>Information privacy</p> Signup and view all the answers

is a small text file that a Web server stores on your computer

<p>Cookie</p> Signup and view all the answers

is an unsolicited e-mail message or newsgroup posting

<p>Spam</p> Signup and view all the answers

blocks e-mail messages from designated sources

<p>E-mail filtering</p> Signup and view all the answers

attempt to remove spam before it reaches your inbox

<p>Anti-spam programs</p> Signup and view all the answers

_________ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information

<p>Phishing</p> Signup and view all the answers

is a scam where a perpetrator attempts to obtain your personal and financial information via spoofing

<p>Pharming</p> Signup and view all the answers

is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety

<p>Social Engineering</p> Signup and view all the answers

________________ involves the use of computers to observe, record, and review an employee’s use of a computer

<p>Employee monitoring</p> Signup and view all the answers

______________ is the process of restricting access to certain material on the Web

<p>Content filtering</p> Signup and view all the answers

______________________ restricts access to specified Web sites

<p>Web filtering software</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser