Computers chapter 5
Terms in this set (50)
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
a means of disabling a system's security which is deliberately left by designers of the system, often to give access to service technicians or maintenance programmers.
make a copy of (a computer file) especially for storage in another place as a security cop
(computer science) a copy of a file or directory on a separate storage device
Authentication techniques that rely on measurable physical characteristics that can be automatically checked
A term used to describe robot-controlled workstations that are part of a collection of other robot-controlled workstations.
code of conduct
A statement that guides the ethical behavior of a company and its employees
Any illegal act involving a computer
rules that state how a computer should be used
occurs when organizations use software that filters content to prevent the transmission of unauthorized information
a short line of text that a web site puts on your computer's hard drive when you access the web site
someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action
Cybercrime is criminal activity done using computers and the Internet. This includes anything from downloading illegal music files to stealing millions of dollars from online bank accounts. Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on other computers or posting confidential business information on the Internet.
someone who uses e-mail as a vehicle for extortion
A hacker whose purpose is to exploit a target computer for a serious impact, such as the corruption of a program to sabotage a business.
The process of changing ciphertext into plaintext.
An assault on a computer that is performed by hackers whose purpose is to disrupt access to the Web. DoS attack is short for denial of service attack
a notice that guarantees a user or a Web site is legitimate
the discovery, collection, and analysis of evidence found on computers and networks
digital security risk
Any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, and programs from loss, damage, and misuse.
An electronic verification of a sender.
disaster recovery plan
A detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood
Majority of large U.S. employers observe employee phone calls, e-mails, Web browsing habits, and computer files
A standard method for encoding data.
captures curves and indentations of a fingerprint
(computing) a security system consisting of a combination of hardware and software that limits the exposure of a computer or computer network to attack from crackers
involves reducing the electricity consumed and environmental waste generated when using a computer
A person who secretly gains access to computers and files without permission.
The rights of individuals and companies to control how information about them is collected and used.
occurs when someone steals personal or confidential information
An agreement issued by a software manufacturer that gives the user the right to use the software.
A program or a set of program instructions that are designed to enter a computer and disrupt its normal operations
online security service
a Web site that evaluates your computer to check for Internet and e-mail vulnerabilities
A safeguard for access to a computer or computer program.
a firewall specifically designed for home networks
An attack that sends an email or displays a Web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
personal identification number
the act of plagiarizing
The process that Microsoft uses to prevent software piracy. For example, once Windows Vista is activated for a particular computer, it cannot be legally installed on another computer.
has the same intent as a cracker but does not have the technical skills and knowledge
A web site that uses encryption techniques to secure its data.
Hackers use their social skills to trick people into revealing access credentials or other valuable information
the illegal copying or use of computer programs
occurs when someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers and/or activates a program
A technique intruders use to make their network or internet transmission appear legitimate
A type of Malware that locates and saves data from users without them knowing about it.
Unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user.
web filtering software
Program that restricts access to certain material on the Web.
A computer that is controlled by a hacker who uses it to launch attacks on other computer systems.
YOU MIGHT ALSO LIKE...
Chapter 5 Terms
Chapter 5 Terms
THIS SET IS OFTEN IN FOLDERS WITH...
Ch 4. Programs and Apps 1-12 Practice quiz
Chapter 3 Terms
CGS2060 chapter 2