50 Questions
A_____________________ is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
computer security risk
Affects a computer negatively by altering the way the computer works
virus
Program that hides in a computer and allows someone from a remote location to take full control
Rootkit
A___________ is an online or Internet-based illegal act
cybercrime
a person who breaks into computer system
Hacker
a person often steal, delete, corrupt, or compromise data
Crackers
A ________ is a group of compromised computers connected to a network
botnet
A compromised computer is known
zombie
A _______________________ disrupts computer access to Internet services
denial of service attack (DoS attack)
A ____________ is a program or set of instructions in a program that allow users to bypass security controls
back door
___________ is a technique intruders use to make their network or Internet transmission appear legitimate
Spoofing
A ________ is hardware and/or software that protects a network’s resources from intrusion
firewall
Copies itself repeatedly, using up resources and possibly shutting down the computer or network
Worm
A malicious program that hides within or looks like a legitimate program
Trojan Horse
Is the use of the internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation.
Cyberterrorist
Analyzes all network traffic. Assesses system vulnerabilities. Identifies any unauthorized intrusions. Notifies network administrators of suspicious behavior patterns or security breaches
Intrusion Detection Software
_____________ is the use of a computer or network without permission
Unauthorized access
is the use of a computer or its data for unapproved or possibly illegal activities
Unauthorized use
Two-phase processes called
Identification and Authentication
A______________ authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
biometric device
_____________ is the discovery, collection, and analysis of evidence found on computers and networks
Digital forensics
is the act of stealing computer equipment
Hardware theft
is the act of defacing or destroying computer equipment
Hardware vandalism
Copying, loaning, borrowing, renting, or distributing software can be a violation of _______________
copyright law
___________occurs when someone steals personal or confidential information
Information theft
is a process of converting readable data into unreadable characters to prevent unauthorized access
Encryption
is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender
Digital Signature
is a notice that guarantees a user or a Web site is legitimate
Digital Certificate
A_____________is the prolonged malfunction of a computer
system failure
is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
Backup
Two categories of backups:
full backup and selective backup
allows individuals to detect wireless networks while driving a vehicle through the area
War driving
The widespread use of computers has led to health concerns such as what?
Repetitive Strain Injury (RSI) Computer Vision Syndrome (CVS)
is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
Ergonomics
occurs when the computer consumes someone’s entire social life
Computer addiction
the moral guidelines that govern the use of computers and information systems
Computer Ethics
are the rights to which creators are entitled for their work
Intellectual property rights
is a strategy designed to prevent illegal distribution of movies, music, and other digital content
Digital rights management
involves reducing the electricity and environmental waste while using a computer
Green Computing
refers to the right of individuals and companies to deny or restrict the collection and use of information about them
Information privacy
is a small text file that a Web server stores on your computer
Cookie
is an unsolicited e-mail message or newsgroup posting
Spam
blocks e-mail messages from designated sources
E-mail filtering
attempt to remove spam before it reaches your inbox
Anti-spam programs
_________ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information
Phishing
is a scam where a perpetrator attempts to obtain your personal and financial information via spoofing
Pharming
is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety
Social Engineering
________________ involves the use of computers to observe, record, and review an employee’s use of a computer
Employee monitoring
______________ is the process of restricting access to certain material on the Web
Content filtering
______________________ restricts access to specified Web sites
Web filtering software
Test your knowledge about computer security threats and cybercrimes with this quiz. Explore different types of threats and illegal activities related to computer systems and networks.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free