Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Chapter 18

QuestionAnswer
Adware software installed on a computer that produces pop-up ads using your browser; the ads are often based on your browsing habits.
Antispyware software software used to remove spyware and adware.
antivirus (AV) software Utility programs that prevent infection or scan a system to detect and remove viruses. McAfee Associates' VirusScan and Norton AntiVirus are two popular AV packages.
ATA Secure Erase Standards developed by the American National Standard Institute (ANSI) that dictate how to securely erase data from solid-state devices such as a USB flash drive or SSD drive in order to protect personal privacy.
biometric device An input device that inputs biological data about a person; the data can identify a person's fingerprints, handprints, face, voice, eyes, and handwriting.
BitLocker Encryption A utility in Windows 7/Vista Ultimate and Enterprise editions that is used to lock down a hard drive by encrypting the entire windows volume and any other volume on the drive.
Boot sector Virus An infectious program that can replace the boot program with a modified, infected version, often causing boot and data retrieval problems.
Computer infestation Any unwanted program that is transmitted to a computer without the user's knowledge and that is designed to do varying degrees of damage to data and software. Like virus and worm. Also called Malicious Software, or Malware Infestation.
Degausser A machine that exposes a storage device to a strong magnetic field to completely erase the data on a magnetic hard drive or tape drive.
Digital Certificate A code used to authenticate the source of a file or document or to identify and authenticate a person or organization sending data over a network. The code is assigned by a certificate authority such as VeriSign and includes a public key for encryption.
email hoax An email message that is trying to tempt you to give out personal information or trying to scam you.
encrypted file system (EFS) A way to use a key to encode a file or folder on an NTFS volume to protect sensitive data. Because it is an integrated system service, EFS is transparent to users and applications.
grayware A program that AV software recognizes to be potentially harmful or potentially unwanted.
key fob A device, such as type of smart card, that can fit conveniently on a key chain.
keylogger A type of spyware that tracks your keystrokes, passwords, chat room sessions, email messages, documents, online purchases, and anything else you type on your PC. Text is logged to a text file and transmitted over the internet without your knowledge.
LoJack A technology by Absolute software used to track the whereabouts of a laptop computer and if the computer is stolen, lock down access to the computer or erase data on it. The technology is embedded in the BIOS of many laptops.
malicious software Any unwanted program that is transmitted to a computer without the user's knowledge and that is designed to do varying degrees of damage to data and software. Like virus and worm. Also called Computer Infestation, or Malware Infestation.
malware Any unwanted program that is transmitted to a computer without the user's knowledge and that is designed to do varying degrees of damage to data and software. Like virus and worm.
phishing A type of identity theft where a person is baited into giving personal data to a web site that appears to be the web site of a reputable company with which the person has an account.
privacy filter A device that fits over a monitor screen to prevent other people from viewing the monitor from a wide angle.
quarantined computer A computer that is suspected of infection and is not allowed to use the network, is put on a different network dedicated to quarantined computers, or is allowed to access only certain network resources.
retinal scanning As part of the authentication process, some systems use biometric data by scanning the blood vessels on the back of the eye and is considered the most reliable of all biometric data scanning.
RFID badge A badge worn by an employee and is used to gain entrance into a locked area of a building. A Radio Frequency Identification token transmits authentication to the system when the token gets in range of a query device.
rootkit A type of malicious software that loads itself before the OS boot is complete and can hijack internal windows components so that it masks information windows provides to user mode utilities such as windows explorer or task manager.
RSA tokens A type of smart card that contains authentication information.
Security Center A center in vista where you can confirm windows firewall, windows update, anti-malware settings, including that of windows defender, and other security settings.
shoulder surfing Where other people secretly peek at your monitor screen as you work to gain valuable information.
smart card Any small device that contains authentication information that can be keyed into a logon window or read by a reader to authenticate a user on a network.
smart card reader A device that can read a smart card used to authenticate a person onto a network.
social engineering The practice of tricking people into giving out private information or allowing unsafe programs into the network or computer.
spyware Malicious software that installs itself on your computer to spy on you. It collects personal information about you that is transmits over the Internet to web-hosting sites that intend to use your personal data for harm.
strong password A password that is not easy to guess.
tailgating When someone who is unauthorized follows the employee through a secured entrance to a room or building.
trojan A type of malware that tricks you into opening it by substituting itself for a legitimate program.
virus A program that often has incubation period, is infectious, and is intended to cause damage. A virus program might destroy data and programs or damage a disk device's boot sector.
virus definition A set of distinguishing characteristics of a virus and used by antivirus software to identify new viruses as they get into the wild. Also called virus signatures.
virus encyclopedia A database about viruses that is kept on the Internet.
virus signature A set of distinguishing characteristics of a virus and used by antivirus software to identify new viruses as they get into the wild. Also called virus definition.
windows defender Antispyware utility included in windows 7/vista.
windows firewall A personal firewall that protects a computer from intrusion and is automatically configured when you set your network location in the network and sharing center.
worm An infestation designed to copy itself repeatedly to memory, on drive space, or on a network, until little memory, disk space, or network bandwidth remains.
Created by: 1118600581486821
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards