Chapter 5 Terms
Terms in this set (50)
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
a means of disabling a system's security which is deliberately left by designers of the system, often to give access to service technicians or maintenance programmers.
make a copy of (a computer file) especially for storage in another place as a security cop
Duplicate of content on a storage medium that you can use in case the original is lost
An input device that inputs biological data about a person, which can be input data to identify a person's fingerprints, handprints, face, voice, eye, and handwritten signature.
A group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes.
Code of conduct
A statement that guides the ethical behavior of a company and its employees
Any illegal act involving a computer
Set of moral principles that regulate the use of computers.
Process of restricting access to certain material
A small file stored on a user's hard drive by a Web server; commonly used to identify personal preferences and settings for that user.
online based illegal acts distributing malicious software
Someone who demands payment to stop an attack
Someone who uses the Internet or network to destroy or damage computers for political reasons.
The process of decoding encrypted data
Denial of service attack
Assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail.
a notice that guarantees a user or a Web site is legitimate
the discovery, collection, and analysis of evidence found on computers and networks
Digital security risk
Any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, and programs from loss, damage, and misuse.
Electronic, encryption-based, secure stamp of authentication
Disaster recovery plan
A written plan that describes the steps a company will take following the occurrence of a disaster.
The use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.
Process of converting readable data into unreadable characters to prevent unauthorized access.
Biometric device that captures curves and indentations of a fingerprint and compares them with those of a stored image.
Hardware or software that protects a network's resources from intrusion
involves reducing the electricity consumed and environmental waste generated when using a computer
A person who breaks into a computer illegally
The rights of individuals and companies to control how information about them is collected and used.
occurs when someone steals personal or confidential information
An agreement issued by a software manufacturer that gives the user the right to use the software.
malicious software that enters a computer system without the owner's knowledge or consent.
Online security service
a Web site that evaluates your computer to check for Internet and e-mail vulnerabilities
A private combination of characters associated with the user name that allows access to certain computer resources.
Utility program that detects and protects a personal computer and its data from unauthorized intrusions.
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
A numeric password
The illegal copying and distribution of software.
Technique that some software manufacturers use to ensure that software is not installed on more computers than legally licensed.
Copy backed up files to their original location on a computer
Cybercriminal who has the same intent as a cracker but does not have the skills
A web site that uses encryption techniques to secure its data.
Scam in which perpetrators gain unauthorized access to or obtain confidential information by taking advantage of the trusting human nature
Unauthorized copying or distribution of copyrighted software
occurs when someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers and/or activates a program
A technique intruders use to make their network or internet transmission appear legitimate
Any software application that covertly gathers information about a user's Internet usage and activity and then exploits this information by sending adware and pop-up ads similar in nature to the user's Internet usage history.
An original name you choose to use to logon to websites
Web filtering software
Program that restricts access to certain material on the Web.
A compromised computer whose owner is unaware the computer is being controlled remotely by an outsider.