Study sets, textbooks, questions
Upgrade to remove ads
Computer Safety (G8)
Describe the threats to a computer network, methods of avoiding attacks, and options in dealing with virus attacks.
Terms in this set (22)
Copies itself repeatedly, using up resources and possibly shutting down the computer or network
A malicious program that hides within or looks like a legitimate program
Software that protects a network from intrusion
A scam in which a perpetrator sends an official looking email that attempts to obtain your personal and financial information
Is a small file that is downloaded by some websites to store your personal info such as logins, shopping cart info, or user preferences
Sending or posting harmful or cruel text or images
Adjunct software that displays advertising while the program it is attached to is running.
A secure site
A computer program that detects viruses and repairs files.
The fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc; done by hackers.
Software program placed on a computer without the user's knowledge that secretly collects information from the user's hard drive.
Right of an individual or company to restrict or deny the use of their private information
The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material and to authorize others to do the same.
Someone who uses the internet to destroy or damage computers for political reasons
Unauthorized and illegal duplication of copyrighted software
Someone who accesses a computer or network illegally
The Communications Decency Act of 1996. This organization prohibits knowingly sending or displaying "indecent" material to minors.
Electronic Footprint (Digital Footprint)
Computers maintain a record of all website visits and e-mail messages, leaving a trail of the user's activity in cyberspace. These data can still exist even after the browser history has been cleared and e-mail messages have been deleted.
In this crime, someone obtains the vital information (e.g., credit card, social security number, bank account numbers) of another person, usually to steal money. E-mail scams, spyware, and viruses are among the most typical methods for stealing someone's identity.
Rules or manners for interacting courteously with others online (such as not typing a message in all capital letters, which is equivalent to shouting).
White hat hacker
A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them.
Black hat hacker
A black hat hacker is an individual with extensive computer knowledge whose purpose is to breach or bypass internet security. Black hat hackers are also known as crackers or dark-side hackers. The general view is that, while hackers build things, crackers break things.
Sets with similar terms
COM S 103 Chapter 11
AP Comp Sci Vocab
computer saftey test study guide
Other sets by this creator
Grade 8 - How the Internet Works
Grade 8 How the Internet Works
Grade 8 Spreadsheet Vocabulary