Chapter 9 - Network and Internet Security
Terms in this set (37)
Any illegal act involving a computer
Gaining access to a computer, network, file, or other resource without permission.
Using a computer resource for unapproved activities.
Using a computer to break into another computer system.
Driving around an area with a Wi-Fi enable computer or mobile device to find a Wi-Fi network to access and use without authorization.
Accessing an unsecured Wi-Fi network from your current location without authorization.
Possessed knowledge access system
An access control system that uses information only the individual should know to identify that individual.
A secret combination of characters used to gain access to a computer, computer network, or other resource.
Using two different methods to authenticate a user.
Possessed object access system
An access control system that uses a physical object an individual has in his or her possession to identify that individual.
Biometric access system
An access control system that uses one uniques physical characteristic of an individual (such as a fingerprint, face, or voice) to authenticate that individual.
A collection of hardware and/or software intended to protect a computer or computer network from unauthorized access.
A method of scrambling the contents of an e-mail message or a file to make it unreadable if an unauthorized user intercepts it.
Secure Web page
A Web page that uses encryption to protect information transmitted via that Web page.
Public key encryption
A type of encryption that uses key pairs to encrypt and decrypt the file or message.
Private key encryption
A type of encryption that uses a single key to encrypt and decrypt the file or message.
Virtual private network (VPN)
A private, secure path over the Internet that provides authorized users a secure means of accessing a private network via the Internet.
An act of malicious destruction to a computer or computer resource.
A computer that is controlled by a hacker or other computer criminal.
A group of bots that are controlled by one individual.
Any type of malicious software.
A software program installed without the user's knowledge and designed to alter the way a computer operates or to cause harm to the computer system.
A malicious program designed to spread rapidly to a large number of computers by sending copies of itself to other computers.
A malicious program that masquerades as something else.
Denial of service (DoS) attack
An act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function.
Software, typically a suite of programs, used to protect your computer against a variety of threats.
Software used to detect and eliminate computer viruses and other types of malware.
A fraud or scam carried out through the Internet.
Using someone else's identity to purchase goods or services, obtain new credit cards or bank loans, or otherwise illegally masquerade as that individual.
The use of spoofed e-mail messages to gain credit card numbers and other personal data to be used for fraudulent purposes.
A personalized phishing scheme targeted at an individual.
The use of spoofed domain names to obtain personal information to be used in fraudulent activities.
Online auction fraud
When an item purchased through an online auction is never delivered after payment, or the item is not as specified by the seller.
A group of electronic data that can be used to verify the identity of a person or organization; includes a key pair that can be use for encryption and digital signatures.
A unique digital code that can be attached to a file or an e-mail message to verify the identity of the sender and guarantee the file or message has not been change since it was signed.
Children or teenagers bullying other children or teenagers via the Internet.
Repeated threats or harassing behavior between adults carried out via e-mail or another Internet communications method.
YOU MIGHT ALSO LIKE...
Network and Internet Security-Ch 9
CMPTR Ch 6
IS 52 Chapter 9 Review
Chapter 6 Info Tech
OTHER SETS BY THIS CREATOR
Business Management Ch 8-11
Chapter 16 - Intellectual Property Rights, Ethics, Health, Access, and the Environment
Chapter 15 - Computer Security and Privacy
Chapter 13 - Program Development and Programming Languages
THIS SET IS OFTEN IN FOLDERS WITH...
Chapter 10 - Multimedia and the Web
Chapter 2 - The System Unit: Processing and Memory
Chapter 11 - E-Commerce
Chapter 1 - Introduction to the World of Computers