Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

IDT

Vocab for my IDT class.

TermDefinition
Computer security risk Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
Computer crime * Any illegal act involving a computer.
Cybercrime * Online or Internet-based illegal acts.
Hacker* Someone who accesses a computer or network illegally.
Cyber extortionist* Someone who uses e-mail as a vehicle for extortion.
Cyberterrorist* Someone who uses the Internet or network to destroy or damage computers for political reasons.
Virus* Potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without a user’s knowledge or permission.
Worm* Malicious-logic program that copies itself repeatedly, using up system resources and possibly shutting down the system.
Trojan horse* Malicious-logic program named after the Greek myth that hides within or looks like a legitimate program.
Malware Short for malicious software; programs that act without a user’s knowledge and deliberately alter a computer’s operations.
Antivirus program Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.
Bot Program that performs a repetitive task on a network.
Botnet* Group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes.
Firewalls* Hardware and/or software that protects a network’s resources from intrusion by users on another network such as the Internet.
Intrusion detection software Program that automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized intrusions, and notifies network administrators of suspicious behavior patterns or system breaches.
Honeypot* Vulnerable computer that is set up to entice an intruder to break into it in order to allow a company to learn how intruders are exploiting its network.
CAPTCHA* Completely Automated Public Turing test to tell Computers and Humans Apart; program used by some Websites to provide further protection for a user’s password by verifying that user input is not computer generated.
Personal identification number Numeric password, either assigned by a company or selected by a user.
Digital forensics* The discovery, collection, and analysis of evidence found on computers and networks.
License agreement An agreement issued by a software manufacturer that gives the user the right to use the software.
Information theft Computer security risk that occurs when someone steals personal or confidential information.
Encryption* The process of encoding data and information to an unreadable form.
Decrypt* Process of deciphering encrypted data into a readable form.
Digital certificate* A notice that guarantees a user or a Website is legitimate.
Noise* Electrical disturbance that can degrade communications.
Power surge Electrical disturbance that occurs when the incoming electrical power increases significantly above the normal 120 volts.
Surge protector Device that uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an over voltage from reaching the computer and other electronic equipment.
Backup Duplicate of a file, program, or disk placed on a separate storage medium that can be used if the original is lost, damaged, or destroyed.
Ergonomics* The science of incorporating comfort, efficiency, and safety into the design of the workplace.
Computer ethics* Moral guidelines that govern the use of computers and information systems.
Morals A person’s standards or beliefs pertaining to their subconscious.
Intellectual property rights* Rights to which creators are entitled for their work.
Copyrights* Exclusive rights given to authors and artists to duplicate, publish, and sell their materials.
Code of conduct Written guide-lines that help determine whether a specific computer action is ethical or unethical.
Spam Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once.
Employee monitoring The use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited.
Created by: amanning