cost and profits
Computer-related waste and mistakes are major causes of computer problems, contributing as the do to unnecessarily high _______ and lost _________
Involves the inappropriate use of computer technology and resources.
Errors, failures, and other computer problems that make computer output incorrect or not useful; most of these are caused by human error.
The US Government
The largest single user of information systems in the world. Generates more waste than other organizations.
Messages that often carry attached files with embedded viruses that can cause networks and computers to crash or allow hackers to gain unauthorized access to system data.
Allows the sending of most e-mail spam as long as it adheres to three basic forms of compliance related to how receivers can unsubscribe, content of the e-mail, and the sending behavior.
A software that attempts to block unwanted e-mail. Many e-mail programs have built-in ____ _______
New tactic spammers use to circumvent spam-filtering software that rejects e-mail based on the content of messages and the use of keywords. The message is presented in a graphic form that can be read by people bu not computers.
Computers rarely make mistakes
Despite many people's distrust of them, _______
access and knowledge to manipulate
Two capabilities criminals need to commit most computer crimes.
Using social skills to get computer users to provide information that allows hackers to access and information system or its data.
Going through the trash cans of an organization to find secret or confidential information, including information needed to access and information system or its data.
Someone who intimidates or coerces a government or organization to advance his political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them.
A crime in which an imposter obtains key pieces of personal identification information, such as social security or driver's license numbers, to impersonate someone else.
A person who enjoys computer technology and spends time learning and using computer systems.
A computer-savvy person who attempts to gain unauthorized or illegal access to computer systems to steal passwords, corrupt files and programs, or even transfer money.
A cracker with little technical savvy who downloads programs called scripts, which automate the job of breaking into computers.
An employee, disgruntled or otherwise, working solo or in concert with outsiders to compromise corporate systems. The biggest threat for many companies is not external hackers, but their own employees.
Logic bombs, Rootkits, Trojan horses, Variants, Viruses, Worms.
A type of trojan horse that executes when specific conditions occur. Triggers for _____ _____ can include a change in a file by a particular series of keystrokes or at a specific time or date.
A set of programs that enables its user to gain administrator level access to a computer or network. Once installed, the attacker can gain full control of the system and even obscure the presence of the _______ from legitimate system administrators.
A malicious program that disguises itself as a useful application or game and purposefully does something the user does not expect.
A modifies version of a virus that is produced by the virus's author or another person by amending the original virus code.
Computer program file capable of attaching to disks or other files and replicating itself repeatedly, typically without the user's knowledge or permission.
Parasitic computer program that replicated, but unlike viruses, does not infect other computer program files. A ____ can send the copies to other computers via a network.
Software that is installed on a personal computer to intercept or take partial control over the user's interaction with the computer without knowledge or permission of the user.
A small program hidden in a network or a computer system that records identification system that records identification numbers and passwords.
disk-wiping software utilities
Overwrite all sectors of your disk drive, making all data unrecoverable.
Works of the mind, such as art, books, films, formulas, inventions, music, and processes that are distinct and "owned" or created by a single person or group.
Protects authored works such as art, books, film, and music.
Protects processes, machines, objects made by humans or machines, compositions of matter, and new uses or these items.
Considered intellectual property and may be protected by copyright or patent law.
The act of unauthorized copying or distribution of copyrighted software.
The act of trying to gain access to customers' private information, by faking a Web site.
Uses phones, sending notice or message to call to verify account information.
The practice of disguising illegally gained funds so that they seem legal.
Can be used to encode data and information to help precent unauthorized use.
IDS (intrusion detection system)
Software that monitors system and network resources and notifies network security personnel when it senses a possible intrusion. When they detect an apparent attack, ___ send an alarm, often by e-mail or pager, to network security personnel.
Software that provides a comprehensive display on a single computer screen of all the vital data related to an organization's security defenses, including threats, exposures, policy compliance and incident alerts. Can provide a snapshot of the data needed to identify and respond to security incidents immediately.
MSSP (Managed Security Service Providers)
Companies can outsource their network security operations to these.
Software that runs in the background of your computer to preotect your computer from dangers lurking on the Internet and other possible sources of infected files.
Microchips with antenna, embedded in many of the products we buy. They generate radio transmissions.
P3P (Platform for Privacy Preferences)
A screening technology in Web browsers that shields users from Web sites that don't provide the level of privacy protection the desire.
Involves publishing an intentionally false written statement that is damaging to a person's or organization's reputation.
John Doe Lawsuit
Using the subpoena power it grants to force the ISP to provide whatever information they have about the anonymous poster, including IP address, name, and street address.
Helps screen internet content, can also prevent children from sending personal information over e-mail or through chat groups.
a short piece of computer code that authors can add to their site, informing what sort of site it is.
Applies to all federal agencies except for the CIA and law enforcement agencies.
A job that requires sitting at a desk and using a computer for many hours a day.
SIT (seated immobility thromboemlism)
The formation of blood clots in the legs or lungs.
CTS (carpal tunnel syndrome)
an aggravation of the pathway for the nerves that travel through the wrist. This involves wrist pain, a feeling of tingling and numbness, and difficulty grasping a holding objects. NOT caused by typing on a keyboard.
Hazardous activities associated with unfavorable conditions. Repetitive motion, awkward posture, and eye strain can cause more serious long-term injuries. Can limit productivity and performance.
the science of designing machines, products, and systems to maximize the safety, comfort, and efficiency of the people who use them.
RSI (repetitive stress injury)
Caused by overuse of the computer through repeated movements that affect muscles, tendons, or nerves in the arms, hands, or upper back.
Code of Ethics
A code that states the principles and core values that are essential to a set of people and that therefore govern their behavior.