Study sets, textbooks, questions
Upgrade to remove ads
Chapter 7 computer Bohn Jesuit Nola
Terms in this set (34)
Acceptable Use Policy
Is a written policy that describes for employees,students, or other network users. The permitted uses for computing equipment and networks.
These programs allow you to schedule automatic scans to run on a regular basis.
Authenticate a persons identity using physical characteristics such as a fingerprint, iris scan, or voice recognition
Scrambles communications between devices so that the data is not not readable.
Used by hackers or cyber criminals to send spam emails, spread viruses , or steal personal data.
Also known as information security, includes all activities related to protecting hardware, software and data from loss due to unauthorized access or use, theft natural disaster, and human error.
Illegal acts involving a computer, is one of the fastest-growing crime areas, with organized crime group increasingly controlling these illegal activities.
Refers to a person who has accessed the network without permission.
Is the right of individuals or organizations to control the information that is collected about them.
May be activated as part of a rookit or Trajan house that records every key stroke you type and sends it back to a criminal
Connecting to someone else's wireless network without the network owner's intent or consent to provide access.
Program hides on the infected computer and provide a back door to bypass computer security for a hacker or other cyber criminal.
Software programs that exist on your computer without your knowledge and track your activities.
This is a type of malware named after the Greek trick. Its a program that hides itself as a good program but really infects your computer with malware.
Using a computer, network, or other resource for purposes other than the intended uses.
Is a form of malware that, once installed on a host without the owners knowledge.
Attempt to pinpoint a networks weaknesses in network security and may even be hired by an organization's network to hack into that network.
A computer that is connected to he internet that is controlled by a hacker or other Cyber criminal without the owners knowledge.
Software programs for pop-ups ads that appear on your desktop or while viewing web pages
A cop of files or an entire dries on a separate storage device
hackers that gain unauthorized access with malicious intent to steal data or for personal gain.
Occurs when a button, graphic , or link on a web page appears software to run.
Is used to remember you when you return to the website.
Denial of Services Attack
Occurs when a network or web server is overwhelmed with network traffic in he form of a constant stream of Bogus emails or other messages to the point that the server's response time becomes slow or shuts down completely.
Which is hardware, software, or a combination of hardware and software that blocks unwanted access to your network.
This occurs when an individual is personal information is obtained by a criminal whom then the information to buy products under the victim's name or otherwise pose as the victim for financial gain.
a virus that prevents a user from accessing files or the entire computer and demands payment before releasing the computer
Is electronic junk mail - unsolicited emails sent to a large group of people at the same time.
Transport layer security
Encrypts transmitted data so that the data is unreadable if intercepted.
using a computer, network, or other resource without permission.
Virtual Private Network
a technology that provides an encrypted connection over the internet
someone who drives around trying to hack other peoples network
A self - replicating program that requires no action on the part of the user to copy itself to another computer or a network
Sets with similar terms
OFM 101 - Pt. 1 Ch 7 - Computer Security…
Ch. 7 Computer
Business Technology Chapter 5
Other sets by this creator
English Vocab Set 19
English vocab set 17
Computer Literacy Chapter 7 Vocabulary
Chapter 7 computer Bohn Jesuit Nola