click below
click below
Normal Size Small Size show me how
IDT
Vocab for my IDT class.
Term | Definition |
---|---|
Computer security risk | Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. |
Computer crime * | Any illegal act involving a computer. |
Cybercrime * | Online or Internet-based illegal acts. |
Hacker* | Someone who accesses a computer or network illegally. |
Cyber extortionist* | Someone who uses e-mail as a vehicle for extortion. |
Cyberterrorist* | Someone who uses the Internet or network to destroy or damage computers for political reasons. |
Virus* | Potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without a user’s knowledge or permission. |
Worm* | Malicious-logic program that copies itself repeatedly, using up system resources and possibly shutting down the system. |
Trojan horse* | Malicious-logic program named after the Greek myth that hides within or looks like a legitimate program. |
Malware | Short for malicious software; programs that act without a user’s knowledge and deliberately alter a computer’s operations. |
Antivirus program | Program that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. |
Bot | Program that performs a repetitive task on a network. |
Botnet* | Group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes. |
Firewalls* | Hardware and/or software that protects a network’s resources from intrusion by users on another network such as the Internet. |
Intrusion detection software | Program that automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized intrusions, and notifies network administrators of suspicious behavior patterns or system breaches. |
Honeypot* | Vulnerable computer that is set up to entice an intruder to break into it in order to allow a company to learn how intruders are exploiting its network. |
CAPTCHA* | Completely Automated Public Turing test to tell Computers and Humans Apart; program used by some Websites to provide further protection for a user’s password by verifying that user input is not computer generated. |
Personal identification number | Numeric password, either assigned by a company or selected by a user. |
Digital forensics* | The discovery, collection, and analysis of evidence found on computers and networks. |
License agreement | An agreement issued by a software manufacturer that gives the user the right to use the software. |
Information theft | Computer security risk that occurs when someone steals personal or confidential information. |
Encryption* | The process of encoding data and information to an unreadable form. |
Decrypt* | Process of deciphering encrypted data into a readable form. |
Digital certificate* | A notice that guarantees a user or a Website is legitimate. |
Noise* | Electrical disturbance that can degrade communications. |
Power surge | Electrical disturbance that occurs when the incoming electrical power increases significantly above the normal 120 volts. |
Surge protector | Device that uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an over voltage from reaching the computer and other electronic equipment. |
Backup | Duplicate of a file, program, or disk placed on a separate storage medium that can be used if the original is lost, damaged, or destroyed. |
Ergonomics* | The science of incorporating comfort, efficiency, and safety into the design of the workplace. |
Computer ethics* | Moral guidelines that govern the use of computers and information systems. |
Morals | A person’s standards or beliefs pertaining to their subconscious. |
Intellectual property rights* | Rights to which creators are entitled for their work. |
Copyrights* | Exclusive rights given to authors and artists to duplicate, publish, and sell their materials. |
Code of conduct | Written guide-lines that help determine whether a specific computer action is ethical or unethical. |
Spam | Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once. |
Employee monitoring | The use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboard activity (used to measure productivity), and Web sites visited. |