How can we help?

You can also find more resources in our Help Center.

20 terms

Chapter 10

STUDY
PLAY
Computer Security Risk
is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
Computer Crime
Any illegal act involving a computer generally is referred to as a(n) __________________
Cyber Crime
The term_________refers to online or Internet-based illegal acts
Hacker
has the same intent as a cracker but does not have the technical skills and knowledge
Cyber Extortionist
is someone who uses e-mail as a vehicle for extortion
Cyber Terrorist
is someone who uses the Internet or network to destroy or damage computers for political reasons
Payload
A(n) _________ is the destructive event or prank malware is intented to deliver
Anti virus program
__________protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files
Spoofing
is a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network
Intrusion Detection Software
automatically analyzed all network traffic, assesses system vulnerabilities, identifies any unauthorized access(intrusions), and notifies network administrators of suspicious behavior patterns or system breaches, including violations of firewalls.
Username
Many web sites require a user to enter a(n) ________, which is unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user
Password
Many web sites require a user to enter a(n) ________, which is a private combo of characters associated with a user name that allows access to certain computer resources
Hardware Theft
is the act of stealing computer equipment
Software theft
occurs when someone steals software media, intentionally erases programs, or illegally copies a program
License Agreement
To protect themselves from software piracy, software manufacturers issue a(n) ____________, which gives users the right to use the software
Info Theft
occurs when someone steals personal or confidential information
System Failure
is the prolonged malfunction of a computer
Search Protector
uses special electrical components to provide a stable current flow to the computer and other electronic equipment
Computer Ethics
are the moral guidelines that govern the use of computers and information systems
Information privacy
refers to the right of individuals and companies to deny or restrict the collection and use of information about them