Podcast
Questions and Answers
A_____________________ is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
A_____________________ is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
computer security risk
Affects a computer negatively by altering the way the computer works
Affects a computer negatively by altering the way the computer works
virus
Program that hides in a computer and allows someone from a remote location to take full control
Program that hides in a computer and allows someone from a remote location to take full control
Rootkit
A___________ is an online or Internet-based illegal act
A___________ is an online or Internet-based illegal act
a person who breaks into computer system
a person who breaks into computer system
a person often steal, delete, corrupt, or compromise data
a person often steal, delete, corrupt, or compromise data
A ________ is a group of compromised computers connected to a network
A ________ is a group of compromised computers connected to a network
A compromised computer is known
A compromised computer is known
A _______________________ disrupts computer access to Internet services
A _______________________ disrupts computer access to Internet services
A ____________ is a program or set of instructions in a program that allow users to bypass security controls
A ____________ is a program or set of instructions in a program that allow users to bypass security controls
___________ is a technique intruders use to make their network or Internet transmission appear legitimate
___________ is a technique intruders use to make their network or Internet transmission appear legitimate
A ________ is hardware and/or software that protects a network’s resources from intrusion
A ________ is hardware and/or software that protects a network’s resources from intrusion
Copies itself repeatedly, using up resources and possibly shutting down the computer or network
Copies itself repeatedly, using up resources and possibly shutting down the computer or network
A malicious program that hides within or looks like a legitimate program
A malicious program that hides within or looks like a legitimate program
Is the use of the internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation.
Is the use of the internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation.
Analyzes all network traffic. Assesses system vulnerabilities. Identifies any unauthorized intrusions. Notifies network administrators of suspicious behavior patterns or security breaches
Analyzes all network traffic. Assesses system vulnerabilities. Identifies any unauthorized intrusions. Notifies network administrators of suspicious behavior patterns or security breaches
_____________ is the use of a computer or network without permission
_____________ is the use of a computer or network without permission
is the use of a computer or its data for unapproved or possibly illegal activities
is the use of a computer or its data for unapproved or possibly illegal activities
Two-phase processes called
Two-phase processes called
A______________ authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
A______________ authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
_____________ is the discovery, collection, and analysis of evidence found on computers and networks
_____________ is the discovery, collection, and analysis of evidence found on computers and networks
is the act of stealing computer equipment
is the act of stealing computer equipment
is the act of defacing or destroying computer equipment
is the act of defacing or destroying computer equipment
Copying, loaning, borrowing, renting, or distributing software can be a violation of _______________
Copying, loaning, borrowing, renting, or distributing software can be a violation of _______________
___________occurs when someone steals personal or confidential information
___________occurs when someone steals personal or confidential information
is a process of converting readable data into unreadable characters to prevent unauthorized access
is a process of converting readable data into unreadable characters to prevent unauthorized access
is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender
is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender
is a notice that guarantees a user or a Web site is legitimate
is a notice that guarantees a user or a Web site is legitimate
A_____________is the prolonged malfunction of a computer
A_____________is the prolonged malfunction of a computer
is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
Two categories of backups:
Two categories of backups:
allows individuals to detect wireless networks while driving a vehicle through the area
allows individuals to detect wireless networks while driving a vehicle through the area
The widespread use of computers has led to health concerns such as what?
The widespread use of computers has led to health concerns such as what?
is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
occurs when the computer consumes someone’s entire social life
occurs when the computer consumes someone’s entire social life
the moral guidelines that govern the use of computers and information systems
the moral guidelines that govern the use of computers and information systems
are the rights to which creators are entitled for their work
are the rights to which creators are entitled for their work
is a strategy designed to prevent illegal distribution of movies, music, and other digital content
is a strategy designed to prevent illegal distribution of movies, music, and other digital content
involves reducing the electricity and environmental waste while using a computer
involves reducing the electricity and environmental waste while using a computer
refers to the right of individuals and companies to deny or restrict the collection and use of information about them
refers to the right of individuals and companies to deny or restrict the collection and use of information about them
is a small text file that a Web server stores on your computer
is a small text file that a Web server stores on your computer
is an unsolicited e-mail message or newsgroup posting
is an unsolicited e-mail message or newsgroup posting
blocks e-mail messages from designated sources
blocks e-mail messages from designated sources
attempt to remove spam before it reaches your inbox
attempt to remove spam before it reaches your inbox
_________ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information
_________ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information
is a scam where a perpetrator attempts to obtain your personal and financial information via spoofing
is a scam where a perpetrator attempts to obtain your personal and financial information via spoofing
is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety
is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety
________________ involves the use of computers to observe, record, and review an employee’s use of a computer
________________ involves the use of computers to observe, record, and review an employee’s use of a computer
______________ is the process of restricting access to certain material on the Web
______________ is the process of restricting access to certain material on the Web
______________________ restricts access to specified Web sites
______________________ restricts access to specified Web sites
Flashcards are hidden until you start studying