Untitled

AgreeableSerpentine4389 avatar
AgreeableSerpentine4389
·
·
Download

Start Quiz

Study Flashcards

50 Questions

A_____________________ is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability

computer security risk

Affects a computer negatively by altering the way the computer works

virus

Program that hides in a computer and allows someone from a remote location to take full control

Rootkit

A___________ is an online or Internet-based illegal act

cybercrime

a person who breaks into computer system

Hacker

a person often steal, delete, corrupt, or compromise data

Crackers

A ________ is a group of compromised computers connected to a network

botnet

A compromised computer is known

zombie

A _______________________ disrupts computer access to Internet services

denial of service attack (DoS attack)

A ____________ is a program or set of instructions in a program that allow users to bypass security controls

back door

___________ is a technique intruders use to make their network or Internet transmission appear legitimate

Spoofing

A ________ is hardware and/or software that protects a network’s resources from intrusion

firewall

Copies itself repeatedly, using up resources and possibly shutting down the computer or network

Worm

A malicious program that hides within or looks like a legitimate program

Trojan Horse

Is the use of the internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation.

Cyberterrorist

Analyzes all network traffic. Assesses system vulnerabilities. Identifies any unauthorized intrusions. Notifies network administrators of suspicious behavior patterns or security breaches

Intrusion Detection Software

_____________ is the use of a computer or network without permission

Unauthorized access

is the use of a computer or its data for unapproved or possibly illegal activities

Unauthorized use

Two-phase processes called

Identification and Authentication

A______________ authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer

biometric device

_____________ is the discovery, collection, and analysis of evidence found on computers and networks

Digital forensics

is the act of stealing computer equipment

Hardware theft

is the act of defacing or destroying computer equipment

Hardware vandalism

Copying, loaning, borrowing, renting, or distributing software can be a violation of _______________

copyright law

___________occurs when someone steals personal or confidential information

Information theft

is a process of converting readable data into unreadable characters to prevent unauthorized access

Encryption

is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender

Digital Signature

is a notice that guarantees a user or a Web site is legitimate

Digital Certificate

A_____________is the prolonged malfunction of a computer

system failure

is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed

Backup

Two categories of backups:

full backup and selective backup

allows individuals to detect wireless networks while driving a vehicle through the area

War driving

The widespread use of computers has led to health concerns such as what?

Repetitive Strain Injury (RSI) Computer Vision Syndrome (CVS)

is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace

Ergonomics

occurs when the computer consumes someone’s entire social life

Computer addiction

the moral guidelines that govern the use of computers and information systems

Computer Ethics

are the rights to which creators are entitled for their work

Intellectual property rights

is a strategy designed to prevent illegal distribution of movies, music, and other digital content

Digital rights management

involves reducing the electricity and environmental waste while using a computer

Green Computing

refers to the right of individuals and companies to deny or restrict the collection and use of information about them

Information privacy

is a small text file that a Web server stores on your computer

Cookie

is an unsolicited e-mail message or newsgroup posting

Spam

blocks e-mail messages from designated sources

E-mail filtering

attempt to remove spam before it reaches your inbox

Anti-spam programs

_________ is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information

Phishing

is a scam where a perpetrator attempts to obtain your personal and financial information via spoofing

Pharming

is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety

Social Engineering

________________ involves the use of computers to observe, record, and review an employee’s use of a computer

Employee monitoring

______________ is the process of restricting access to certain material on the Web

Content filtering

______________________ restricts access to specified Web sites

Web filtering software

Test your knowledge about computer security threats and cybercrimes with this quiz. Explore different types of threats and illegal activities related to computer systems and networks.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Computer Security and Ethics Quiz
10 questions
Computer Hacking and Cybercrimes
10 questions
Computer Criminal Categories
18 questions

Computer Criminal Categories

EnergyEfficientApostrophe avatar
EnergyEfficientApostrophe
Use Quizgecko on...
Browser
Browser