click below
click below
Normal Size Small Size show me how
Chapter 5
Test Monday 5:00
Term | Definition |
---|---|
802.11i | the most recent network security standard, conforms to the government’s security standards and uses more sophisticated encryption techniques |
Access control | defines who can access a computer, when they can access it, and what actions they can take |
Adware | a program that displays an online advertisement in a banner or pop-up window |
Anti-spam program | an alternative to e-mail filtering |
Antivirus program | protects a computer against viruses by identifying and removed any computer viruses found in memory, on storage media, or on incoming files |
Audit trail | - records in a file both successful and unsuccessful access attempts |
Back door | a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network |
Back up | make a copy of a file |
Backup | - a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed |
Biometric device | authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic |
Biometric payment | where the customer’s fingerprint is read by a fingerprint reader that is linked to a specific payment method such as a checking account or credit card |
Botnet | a group of compromised computers connected to a network such as the internet that are used as part of a network that attacks other network, usually for nefarious purposes |
CAPTCHA | Completely Automated Public Turing test to tell Computers and Humans apart, is a program that verifies user input is not computer generated |
Certificate authority | - an authorized person or a company that issues and verifies digital certificates |
Clickjacking | an object that can be clicked on a Web site, such as a button image, or link, contains a malicious program |
Computer addiction | occurs when the computer consumers someone’s entire social life |
Computer crime | - an intentional breach of computer security often involves a deliberate act that is against that law; any illegal involving a computer |
Computer ethics | the moral guidelines that govern the use of computers and information systems |
Computer security risk | any event or action that could cause a loss of or damage to computer hardware, software data, information, or processing capability |
Computer vision syndrome | a condition where the patient suffers from sore, tired, burning, itching, or dry eyes; blurred or double vision; distance blurred vision after prolonged staring at a display device; headache or sore neck; difficulty focusing between a display device and d |
Content filtering | restricts access to certain material in the Web |
Cookie | a small text file that a Web server stores on your computer |
Copyright | gives authors and artists exclusive rights to duplicate, publish, and sell their materials |
Cracker | someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action |
Cybercrime | refers to online or internet-based illegal acts- gives authors and artists exclusive rights to duplicate, publish, and sell their materials; protects an tangible form of expression |
Cyberextortionist | - someone who uses e-mail as a vehicle for extortion |
Cyberterroist | someone who uses the internet or network to destroy or damage computers for political reasons |
Decrypt | to decipher data into readable form |
Denial of service attack | an assault whose purpose is to disrupt computer access to an internet service such as the Web or e-mail |
Digital certificate | - a notice that guarantees a user or a Web site is legitimate |
Digital forensics | also called computer forensics, network forensics, or cyberforensics; the discovery, collection and analysis of evidence found on computers and networks |
Digital rights management | a strategy designed to prevent illegal distribution of movies, music and other digital content |
Digital signature | an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender |
DoS attack | - an assault whose purpose is to disrupt computer access to an internet service such as the Web or e-mail |
E-mail filtering | - a service that blocks e-mail messages from designed sources |
Employee monitoring- | involves the use of computers to observe, record and review an employee’s use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), a Web sites visited |
Encryption- | the process of converting readable data into unreadable characters to prevent unauthorized access |
Encryption algorithm | a set of steps that can convert readable plaintext into unreadable ciphertext. |
Encryption key | a programmed formula that the originator of the data uses a encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext |
ENERGY STAR program | helps reduce the amount of electricity used by computers and related devices |
Firewall- | hardware and/or software the protects a network’s resources from intrusion by users on another network such as the internet |
Green computing | involves reducing the electricity and environmental waste while using a computer |
Hacker | to someone who accesses a computer or network illegally |
Hardware theft | the act of stealing computer equipment |
Hardware vandalism | the act of defacing or destroying computer equipment |
Information privacy | refers to the right of individuals and companies to deny or restrict the collection and the use of information about them |
Information theft- | occurs when someone steals personal or confidential information |
Intellectual property rights- | the rights to which creators are entitled for their work |
Intrusion detection software | automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusion), and notifies network administrations of suspicious behavior patterns or system breaches |
License agreement | - is the right to use the software |
Malware | programs that act without a user’s knowledge and deliberately alter the computer’s operations |
Password | a private combination of characters associated with the user name that allows access to certain computer resources |
Payload | the destructive event or prank the program is intended to deliver |
Personal firewall | a utility program that detects and protects a personal computer and its data from unauthorized intrusions |
Personal identification number (PIN) | a numeric password, either assigned by a company or selected by a user |
Pharming | a scam, similar to phishing, where a perpetrator attempts to obtain your personal and financial information, except they do so via spoofing |
Phishing- | a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information |
Phishing filter | a program that warns or blocks you from potentially fraudulent or suspicious Web sites |
Piracy | the unauthorized and illegal duplication of copyrighted software |
Possessed object | any item that you must carry to gain access to a computer or computer facility |
Product activation | - conducted either online or by telephone, users provide the software product’s 25-charatcer identification number to receive an installation identification number unique to the compute on which the software is installed |
Quarantine | - a separate are of a hard disk that holds the infected file until the infection can be removed |
Real time location system (RTLS)- | tracks and identifies the location of high-risk or high-value items |
Repetitive strain injury (RSI) | an injury or disorder of the muscles, nerves, tendons, ligaments, and joints |
Restore | making a copy of the backed up files to their original location on the computer |
Rootkit | a program that hides in a computer and allows someone from a remote location to take full control of the computer |
Script kiddie | has the same intent a cracker but does not have the technical skills and knowledge |
Secure site | - a Web sites that uses encryption techniques to secure its data |
Social engineering | gaining unauthorized access or obtained confidential information by taking advantage of the trusting human nature of some victims and the naivety of others |
Software theft | occurs when someone steals software media, intentionally erases programs, illegally copies a program, or illegally registers and/or activates a program |
Spam | an unsolicited e-mail message or newsgroup posting sent to multiple recipients or newsgroups at once |
Spoofing | a technique intruders use to make their network or internet transmission appear legitimate to a victim computer or network |
Spyware | a program placed on a computer without the user’s knowledge that secretly collects information about the user |
Surge protector | uses special electrical components to provide a stable current |
System failure | the prolonged malfunction of a computer |
Trojan horse | - a program that hides within or looks like a legitimate program |
Trusted source- | an organization or person you believe will not send a virus infected or form a trusted source |
Unauthorized access | the use of computer or network without permission |
Unauthorized use | the use of a computer or its data for unapproved or possibly illegal activities |
Uninterruptible power supply (UPS) | a device that contains surge protection circuits and one or more batteries that can provide power during a loss of power |
User name | a unique combination characters, such as letters of the alphabet or numbers, that identifies one specific user |
Virus | a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission |
Virus definition | a known specific pattern of virus code |
Virus hoax | an e-mail massage that warns users of a nonsexist virus or other malware |
Virus signature | a known specific pattern of virus code |
War driving | individuals attempt to detect wireless access networks via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network |
Web filtering software | a program that restricts access to specified Web sites |
Wi-Fi Protected Access | a security standard that improves on older security standards by authenticating network users and providing more advanced encryption techniques |
Worm | a program that copies itself repeatedly |
Zombie | one whose owner is unaware the computer is being controlled remotely by an outsider |