Computer Security Risks

Card Set Information

Author:
Mingming
ID:
286251
Filename:
Computer Security Risks
Updated:
2014-10-19 09:52:17
Tags:
IT
Folders:
IT
Description:
Computer Security Risks
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user Mingming on FreezingBlue Flashcards. What would you like to do?


  1. any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
    computer security risk
  2. online or Internet-based illegal act
    cybercrime
  3. Types of cybercrime
    • Hackers
    • Crackers
    • Script Kiddies
    • Corporate Spies
    • Unethical Employees
    • Cyber extortionists
    • Cyberterrorists
  4. Affects a computer negatively by altering the way the computer works
    Computer Virus
  5. Copies itself repeatedly, using up resources and possibly shutting down the computer or network
    Worm
  6. A malicious program that hides within or looks like a legitimate program
    Trojan Horse
  7. Program that hides in a computer and allows someone from a remote location to take full control
    Rootkit
  8. **note**
    • Operating system runs much slower than usual
    • Available memory is less than expected
    • Files become corrupted
    • Screen displays unusual message or image
    • Music or unusual sound plays randomly
    • Existing programs and files disappear
    • Programs or files do not work properly
    • Unknown programs or files mysteriously appear
    • System properties change
    • Operating system does not start up
    • Operating system shuts down unexpectedly
  9. group of compromised computers connected to a network
    botnet
  10. A compromised computer
    zombie
  11. disrupts computer access to Internet services
    denial of service attack (DoS attack)
  12. a program or set of instructions in a program that allow users to bypass security controls
    back door
  13. a technique intruders use to make their network or Internet transmission appear legitimate
    Spoofing
  14. a hardware and/or software that protects a network’s resources from intrusion
    firewall
  15. the use of a computer or network without permission
    Unauthorized access
  16. the use of a computer or its data for unapproved or possibly illegal activities
    Unauthorized use
  17. define who can access a computer, when they can access it, and what actions they can take
    Access controls
  18. Two-phase processes
    • identification
    • authentication
  19. any item that you must carry to gain access to a computer or computer facility
    possessed object
  20. PIN meaning
    personal identification number
  21. authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
    biometric device
  22. the discovery, collection, and analysis of evidence found on computers and networks
    Digital forensics
  23. the act of stealing computer equipment
    Hardware theft
  24. the act of defacing or destroying computer equipment
    Hardware vandalism
  25. security measures to help the reduce of chances of theft
    • Physical access controls
    • Alarm systems
    • Cables to lock equipment
    • Real time location system
    • Passwords, possessed objects, and biometrics
  26. **note**
    • A single-user license agreement contains the following condition:
    • Permitted to:
    • Install the software on one computer
    • Make one copy of the software
    • Remove the software from your computer before giving it away or selling it
  27. **note**
    • A single-user license agreement contains the following condition:
    • Not permitted to:
    • Install the software on a network
    • Give copies to friends or colleagues while continuing to use the software
    • Export the software
    • Rent or lease the software
  28. ___ , ___ , ___ , ___ , ___ or ___ software can be a violation of copyright law
    • Copying
    • loaning
    • borrowing
    • renting
    • distributing
  29. Some software requires ___ to function fully
    product activation
  30. occurs when someone steals personal or confidential information
    Information theft
  31. a process of converting readable data into unreadable characters to prevent unauthorized access
    Encryption
  32. an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender
    digital signature
  33. a notice that guarantees a user or a Web site is legitimate
    digital certificate
  34. issues digital certificate
    certificate authority
  35. the prolonged malfunction of a computer
    system failure
  36. Two ways to protect from system failures
    • surge protectors
    • uninterruptable power supplies
  37. moral guidelines that govern the use of computers and information systems
    Computer ethics
  38. involves reducing the electricity and environmental waste while using a computer
    Green computing
  39. refers to the right of individuals and companies to deny or restrict the collection and use of information about them
    Information privacy
  40. a small text file that a Web server stores on your computer
    cookie
  41. **note**
    • Web sites use cookies for a variety of reasons:
    • Allow for personalization
    • Store users’ passwords
    • Assist with online shopping
    • Track how often users visit a site
    • Target advertisements
  42. an unsolicited e-mail message or newsgroup posting
    Spam
  43. blocks e-mail messages from designated sources
    E-mail filtering
  44. attempt to remove spam before it reaches your inbox
    Anti-spam programs
  45. a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information
    Phishing
  46. a scam where a perpetrator attempts to obtain your personal and financial information via spoofing
    Pharming
  47. 10 COMMANDMENTS OF COMPUTER ETHICS
    • 1. Thou shall not use a computer in ways that may harm people.
    • 2. Thou shall not interfere with other people's computer work.
    • 3. Thou shall not snoop around in other people's computer files.
    • 4. Thou shall not use a computer to steal.
    • 5. Thou shall not use a computer to false witness
    • 6. Thou shall not copy or use proprietary software for which you have not paid.
    • 7. Thou shall not use other people's computer resources without authorization or proper compensation.
    • 8. Thou shall not appropriate other people's intellectual output.
    • 9. Thou shall think about the social consequences of the program you are writing or the system you are designing.
    • 10. Thou shall always use a computer in ways that ensure consideration and respect for your fellow humans.

What would you like to do?

Home > Flashcards > Print Preview