Chapter 5: Digital Safety and Security
Terms in this set (18)
A program that allows an unauthorized user to bypass the security controls on a computer and access programs, files, and the network. Computers with a back door that are controlled by others are called zombies.
The process of copying the files on a computer to a safe location so that they may be available if something goes wrong. Full backups copy all the files that are currently on the drive, incremental backups copy that chanced since the last full backup, differential backups log all the changes since the last full backup, and selective backups only copy those files the user indicates.
A program that performs repetitive tasks on a network.
A business that provides and verifies digital certificates online.
Someone who accesses a computer or computer network illegally with the intent of stealing information, destroying data, or performing a malicious action.
Someone who uses the Internet or network to damage data or computers for political or religious reasons.
The process of taking a chunk of encrypted data and converting it back to a form that can be read and used.
A digital certificate makes uses of asymmetric encryption to provide a means of guaranteeing that a user or website is legitimate. If the certificate comes from a source you don't already know, its best to verify through a certificate authority.
The process by which a chunk of data is mathematically modified to make it unreadable to anyone that does not possess the proper key and/or technique for accessing it.
A computer program that protects a user by blocking unauthorized transmissions and informing the user about any attempted intrusions. Programs communicate through ports and a firewall does not allow access to ports that are not explicitly allowed by the user.
A computer enthusiast who accesses a computer or network illegally. Often this is doen by hackers for the challenge of getting past the security and the hacker does not do any malicious damage when inside.
Malicious software that consists of programs that act without a user's knowledge and deliberately after the operations of computers and mobile devices. Examples include viruses, rootkits, worms, and Trojan horses.
A scam in which the perpetrator sends an official email or communication that attempts to obtain a user's passwords or personal and financial information.
Malware that hides in a computer or mobile device and allows a remote user to take full control of the computer or device.
Someone who lacks the technological skill to break into a computer or computer network, but who does so through the use of premade programs and hacker tools.
The act of making an internet transmission appear as if it was legitimately sent by someone else.
Malware that disguises itself as a desirable program such as a game, but when it is installed it may perform malicious tasks behind the scenes such as implanting a rootkit.
Malware that works by copying itself repeatedly in memory or storage. While it does not directly damage files, the copies may eventually consume all available resources and cause the computer, device, or network to cease functioning.
YOU MIGHT ALSO LIKE...
Computers Chapter 5
THIS SET IS OFTEN IN FOLDERS WITH...
Chapter 2- Connecting and Communicating Online
Types of Storage
MIS Chapter 5: Digital Security
Information Systems Midterm