Like this study set? Create a free account to save it.

Sign up for an account

Already have a Quizlet account? .

Create an account

Computer Security Risk

is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability

Computer Crime

Any illegal act involving a computer generally is referred to as a(n) __________________

Cyber Crime

The term_________refers to online or Internet-based illegal acts


has the same intent as a cracker but does not have the technical skills and knowledge

Cyber Extortionist

is someone who uses e-mail as a vehicle for extortion

Cyber Terrorist

is someone who uses the Internet or network to destroy or damage computers for political reasons


A(n) _________ is the destructive event or prank malware is intented to deliver

Anti virus program

__________protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files


is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network

Intrusion Detection Software

automatically analyzed all network traffic, assesses system vulnerabilities, identifies any unauthorized access(intrusions), and notifies network administrators of suspicious behavior patterns or system breaches, including violations of firewalls.


Many web sites require a user to enter a(n) ________, which is unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user


Many web sites require a user to enter a(n) ________, which is a private combo of characters associated with a user name that allows access to certain computer resources

Hardware Theft

is the act of stealing computer equipment

Software theft

occurs when someone steals software media, intentionally erases programs, or illegally copies a program

License Agreement

To protect themselves from software piracy, software manufacturers issue a(n) ____________, which gives users the right to use the software

Info Theft

occurs when someone steals personal or confidential information

System Failure

is the prolonged malfunction of a computer

Search Protector

uses special electrical components to provide a stable current flow to the computer and other electronic equipment

Computer Ethics

are the moral guidelines that govern the use of computers and information systems

Information privacy

refers to the right of individuals and companies to deny or restrict the collection and use of information about them

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

Voice Recording