authenticates a person's identity by tanslating a personal characteristic, such as a fingerprint into digital code that is then compared with a digital code stored in a computer verifying a physical or behavioral characteristic
someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action
someone who uses e-mail as a vehicle for extortion
denial of service attack
an assault whose purpose is to disrupt computer access to an internet service such as the web or email
An assault on a computer that is performed by hackers whose purpose is to disrupt access to the Web. DoS attack is short for denial of service attack
someone who accesses a computer or network illegally
is the act of stealing computer equipment
intrusion detection software
automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns or system breaches, including violations of firewalls.
is the right to use the software.
a private combination of characters associated with the user name that allows access to certain computer resources
destructive event or prank the program is intended to deliver
any item that you must carry to gain access to a computer or facility
has the same intent as a cracker but does not have the technical skills and knowledge
Unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once.
prolonged malfunction of a computer that can cause loss of hardware, software, or data
a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.