22 terms

Ch 11 Computer..

STUDY
PLAY
Pharming
scam when someone tries to steal your personal information
backup
duplicate file if the original is damaged
encryption
turns readable data into unreadable data to prevent unauthorized access
biometric device
authenicates a person's identity
back door
set of instrustions and you can bypass security
DOS attack
disrupt computer access
quarantine
holds a infection file until it can be removed
virus definition
specific pattern of virus code
trojan horse
hides within a program
cracker
accesses a computer illegally
anti-spam program
removes junk
spam
unsolicited e-mail message
system failure
natural disasters
encryption key
decrypt ciphertext
expansion
encryption that inserts characters
information theft
stealing credit card numbers
software piracy
duplicated copyright software
firewall
protects a network's resources
virus hoax
form of a chain letter
worm
copies itself repeatedly
virus
damages computer programs
cybercrime
illegal acts on the internet