NWMSU CSIS Chapter 5 terms
Terms in this set (91)
Is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
Is the unauthorized and illegal duplication of copyrighted software.
Disaster Recovery Plan
is a written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster.
Is the process of converting data that is readable by humans into encoded characters to prevent unauthorized access.
Is a private combination of characters associated with a username that allows access to certain computer resources.
is a set of steps that can convert readable plain text into unreadable cipher text.
refers to someone who demands payment to stop an attack on an organization's technology infrastructure.
Is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, network, or computer.
This term was once a complimentary work for a computer enthusiast.
is a group of compromised computers or mobile devices connected to a network that are used to attack other networks.
A zombie army is also called a
Has the intent of destroying data and stealing information and uses prewritten hacking and cracking programs due to not having the skills independently.
is someone who uses the Internet or network to destroy or damage computers for political reasons.
is a program that blocks or limits access to a computer, phone, or file until the user pays a specified amount of money.
Continuous data backup
is very expensive and requires a great amount of storage due to being the only real-time backup (backup is synchronous to any changes made.
is a private combination of words, often containing mixed capitalization and punctuation, associated with a username that allows access to certain computer resources.
is a compromised computer or devise whose owner is unaware the computer or device is being controlled remotely by an outsider.
has advanced computer and network skills and a goal of destroying data or stealing information.
is a program that hides in a computer or mobile device and allows someone from a remote location to take full control over the computer or device.
is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt.
refers to someone who access a computer or network illegally.
digital security risk
is any event or action that could cause a loss or damage to a computer or mobile device hardware, software, data, information, or processing capability
is any illegal act involving the use of a computer or related devices generally is referred to as a ______________.
an online or internet-based illegal act
company illegally steals proprietary information from another country.
steal information from corporate level of company.
short for malicious software, consists or programs that act without a user's knowledge and deliberately alter the operations of computers and mobile devices.
a program that displays an online advertisement in a banner, pop up window, or pop under window on webpages, email messages, or other internet services.
a program placed on a computer or mobile device without the user's knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.
a program that hides within or looks like a legitimate program unlike a virus, or worm, a trojan horse does not replicate itself to other computer or devices.
a program that copies itself repeatedly. for example, in memory or on a network, using up resources and possibly shutting down the computer, device, or network.
a potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission.
group of compromised computers or mobile devices connected to a network.
denial of service attach
disrupts computer access to an internet service.
is hardware and/or software that protects a network's resources from intrusion.
use of a computer or network without permission
the use of a computer or its data for unapproved or possibly illegal activities.
acceptable use policy
outlines the activities for which a computer may or may not be used.
define who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it.
The computer, device or network should maintain an __________________ that records in a file both successful and unsuccessful access attempts.
unique combination of characters that identifies a specific user
PIN (personal identification number)
sometimes called a pass code, is a numeric password, either assigned by a company or selected by a user.
authenticates a person's identity (like a finger print reader or facial recognition.) by translating a personal characteristic into a digital code that is compared with a digital code stored in a computer or mobile device verifying a physical or behavioral characteristic.
uses two separate methods, one after the next, to verify the identity of a user.
another name for two-step verification
is the discovery, collection, and analysis of evidence found on computers and networks.
occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program.
conducted either online or by phone. users provide the software product's identification number to associate the software with the computer or mobile device on which the software is installed.
is the right to use software
occurs when someone steals personal or confidential information
is the process of converting data that is readable by humans into encoded characters to prevent unauthorized access.
an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender.
is a notice that guarantees a user or a website is legitimate.
a website that uses encryption techniques to secure its data
the act of stealing digital equipment
involves defacing or destroying digital equipment
is a duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed.
back up a file
to _________________________ means to make a copy of it that can be accessed if the original is lost.
are stored in a location separate from the computer or mobile device site.
internet service that provides storage to users.
backup that copies all of the files on media in the computer.
a backup that copies only the files that have changed since the last full backup.
backup where users choose which folders and files to include in a backup.
continuous data protection (CDP)
backup where all data is backed up whenever a change is made.
backup where files are backed up to the cloud as they change.
Wireless access point
Some perpetrators connect to a network through an unsecured __________________, or WAP.
moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies.
this concern involves the fact that not all web information is correct.
code of conduct
a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.
refers to unique and original works such as ideas, inventions, art, writings, processes, company and product names, and logos.
intellectual property rights
are the rights to which creators are entitled to their work.
protects any tangible form of expression.
digital rights management (DRM)
is a strategy designed to prevent illegal distribution of movies, music, and other digital content.
involves reducing the electricity and environmental waste while using computers, mobile devices, and related technologies.
refers to the right of individuals and companies to deny or restrict the collection, use, and dissemination of information about them.
small text file that a web server stores on your computer to keep track of information.
a scam in which a perpetrator sends an official looking message that attempts to obtain your personal information or financial information.
an object that can be tapped or clicked on a website contains a malicious program.
is devised as gaining unauthorized access to or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of other.
involves the use of computers, mobile devices, or cameras to observe, record, and review and employee's us of a technology, including communications such as email messages, keyboard activity, and websites visited.
is the process of restricting access to certain material.
Web filtering software
restricts access to specified websites.
is a program that preforms a repetitive tsk on a network.
software firewall that detects and protects a personal computer and is data from unauthorized intrusions.
stores all your account information securely.
is any item that you must carry with you in order to gain access to a computer or computer facility. Includes badges, cards, smart cards and keys.
digital forensics is also called
disc burning software
writes text, graphics, audio, and video files on a record-able or re-writable disk.
this is done by copying the backed up files to their original location on the computer of mobile device after a file has been corrupted.
is a nonprofit organization that allows content owners to specify how their online content can be reused on other websites.
YOU MIGHT ALSO LIKE...
Introduction to Business | Gaspar, Bierman, Kolari, Hise, Smith, Arreola-Risa
Computers Chapter 5
CSIC Module 5
OTHER SETS BY THIS CREATOR
Nutrition Exam 3
Cell Biology Exam 2 objectives
Cell Biology 2
THIS SET IS OFTEN IN FOLDERS WITH...
NWMSU Computers and Info Tech Chapter 2
NWMSU 1: primary vocab
NWMSU CSIS chapter 3 terms
NWMSU CSIS Chapter 4 terms