Chapter 11 - Computer Security and Safety, Ethics, and Privacy
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
Higher-level Web browser encryption protection level. | show 🗑
|
||||
show | 128-bit encryption
🗑
|
||||
show | 40-bit encryption
🗑
|
||||
show | 802.11i
🗑
|
||||
show | access control
🗑
|
||||
Intrusion technique in which an individual attempts to detect wireless networks via their notebook computer while driving a vehicle through areas they suspect have a wireless network. See also war driving. | show 🗑
|
||||
Program that displays an online advertisement in a banner or pop-up window on Web pages, e-mail, or other Internet services. | show 🗑
|
||||
Program that attempts to remove spam before it reaches a user’s inbox. | show 🗑
|
||||
show | antivirus program
🗑
|
||||
Type of encryption that uses two encryption keys: a public key and a private key. See also public key encryption. | show 🗑
|
||||
show | audit trail
🗑
|
||||
Access control that verifies an individual is the person he or she claims to be. | show 🗑
|
||||
show | back door
🗑
|
||||
To make a copy of a file. | show 🗑
|
||||
show | backup
🗑
|
||||
Device that authenticates a person’s identity by translating a personal characteristic, such as a fingerprint, into a digital code that then is compared with a digital code stored in a computer verifying a physical or behavioral characteristic. | show 🗑
|
||||
show | biometric payment
🗑
|
||||
show | blackout
🗑
|
||||
show | bot
🗑
|
||||
show | botnet
🗑
|
||||
A prolonged undervoltage. | show 🗑
|
||||
Organization formed by a number of major software companies to promote a better understanding of software piracy problems and, if necessary, to take legal action. | show 🗑
|
||||
show | CAPTCHA
🗑
|
||||
show | carpal tunnel syndrome (CTS)
🗑
|
||||
Federally funded Internet security research and development center. | show 🗑
|
||||
show | certificate authority (CA)
🗑
|
||||
Term used in three-generation backups to refer to the most recent copy of the file. | show 🗑
|
||||
Encrypted (scrambled) data. | show 🗑
|
||||
Scam in which an object that can be clicked on a Web site, such as a button, image, or link, contains a malicious program. | show 🗑
|
||||
Written guidelines that help determine whether a specific computer action is ethical or unethical. | show 🗑
|
||||
show | computer addiction
🗑
|
||||
show | computer crime
🗑
|
||||
Federally funded Internet security research and development center. See also CERT/CC. | show 🗑
|
||||
Moral guidelines that govern the use of computers and information systems. | show 🗑
|
||||
show | computer forensics
🗑
|
||||
Any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. | show 🗑
|
||||
show | computer vision syndrome
🗑
|
||||
Process of restricting access to certain material on the Web. | show 🗑
|
||||
show | cookie
🗑
|
||||
show | copyright
🗑
|
||||
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action. | show 🗑
|
||||
Software used by cybercriminals. | show 🗑
|
||||
show | CVS
🗑
|
||||
Online or Internet-based illegal acts. | show 🗑
|
||||
show | cyberextortionist
🗑
|
||||
The discovery, collection, and analysis of evidence found on computers and networks. See also computer forensics, digital forensics, or network forensics. | show 🗑
|
||||
show | cyberterrorist
🗑
|
||||
show | cyberwarfare
🗑
|
||||
Set of steps that can convert readable plaintext into unreadable ciphertext. See also encryption algorithm. | show 🗑
|
||||
More devastating type of denial of service attack in which a zombie army is used to attack multiple computer networks. | show 🗑
|
||||
show | decrypt
🗑
|
||||
Assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. See also DoS attack. | show 🗑
|
||||
A notice that guarantees a user or a Web site is legitimate. | show 🗑
|
||||
The discovery, collection, and analysis of evidence found on computers and networks. See also computer forensics, cyberforensics, or network forensics. | show 🗑
|
||||
Strategy designed to prevent illegal distribution of movies, music, and other digital content. | show 🗑
|
||||
show | digital signature
🗑
|
||||
Assault on a computer or network whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. See also denial of service attack. | show 🗑
|
||||
Strategy designed to prevent illegal distribution of movies, music, and other digital content. See also digital rights management. | show 🗑
|
||||
Service that blocks e-mail messages from designated sources. | show 🗑
|
||||
Spoofing that occurs when the sender's address or other components of the e-mail header are altered so that it appears the e-mail originated from a different sender. | show 🗑
|
||||
show | employee monitoring
🗑
|
||||
show | encryption
🗑
|
||||
show | encryption algorithm
🗑
|
||||
Set of characters that the originator of the encrypted data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext. | show 🗑
|
||||
License agreement included with software purchased by individual users. See also single-user license agreement. | show 🗑
|
||||
Program developed by the United States Department of Energy (DOE) and the United States Environmental Protection Agency (EPA) to help reduce the amount of electricity used by computers and related devices. | show 🗑
|
||||
show | ergonomics
🗑
|
||||
show | Fair Credit Reporting Act
🗑
|
||||
show | fault-tolerant computer
🗑
|
||||
show | firewall
🗑
|
||||
Backup procedure that copies all program and data files in the computer. Also called archival backup. | show 🗑
|
||||
Term used in three-generation backups to refer to the oldest copy of a file. | show 🗑
|
||||
Computer usage that reduces the electricity and environmental waste involved in using a computer. | show 🗑
|
||||
show | hacker
🗑
|
||||
The act of stealing computer equipment. | show 🗑
|
||||
show | hardware vandalism
🗑
|
||||
Mathematical formula that generates a code from the contents of an electronic message. | show 🗑
|
||||
Vulnerable computer that is set up to entice an intruder to break into it in order to allow a company to learn how intruders are exploiting its network. | show 🗑
|
||||
show | identification
🗑
|
||||
Right of individuals and companies to deny or restrict the collection and use of information about them. | show 🗑
|
||||
Computer security risk that occurs when someone steals personal or confidential information. | show 🗑
|
||||
Capability of an antivirus program to record information such as file size and file creation date in a separate file in order to detect viruses. | show 🗑
|
||||
show | intellectual property (IP)
🗑
|
||||
show | intellectual property rights
🗑
|
||||
show | Internet Content Rating Association (ICRA)
🗑
|
||||
Program that automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized intrusions, and notifies network administrators of suspicious behavior patterns or system breaches. | show 🗑
|
||||
Spoofing technique where an intruder computer fools a network into believing its IP address is associated with a trusted source. | show 🗑
|
||||
Unit of energy a surge protection device can absorb before it can be damaged. | show 🗑
|
||||
Short for key generator; program that creates software registration numbers and sometimes activation codes used for software theft. | show 🗑
|
||||
show | license agreement
🗑
|
||||
show | macros
🗑
|
||||
show | malicious software
🗑
|
||||
show | malware
🗑
|
||||
show | network forensics
🗑
|
||||
Electrical disturbance that can degrade communications. | show 🗑
|
||||
Type of UPS device that switches to battery power when a problem occurs in the power line. See also standby UPS. | show 🗑
|
||||
Location separate from a computer site. | show 🗑
|
||||
show | online security service
🗑
|
||||
Type of UPS device that always runs off a battery, which provides continuous protection. | show 🗑
|
||||
Electrical disturbance that occurs when the incoming electrical power increases significantly above the normal 120 volts. See also power surge. | show 🗑
|
||||
show | parent
🗑
|
||||
Private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources. | show 🗑
|
||||
show | password
🗑
|
||||
show | payload
🗑
|
||||
Utility program that detects and protects a personal computer and its data from unauthorized intrusions. | show 🗑
|
||||
Numeric password, either assigned by a company or selected by a user. | show 🗑
|
||||
show | pharming
🗑
|
||||
Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information. | show 🗑
|
||||
Program that warns or blocks you from potentially fraudulent or suspicious Web sites. | show 🗑
|
||||
Unauthorized and illegal duplication of copyrighted material. | show 🗑
|
||||
show | plaintext
🗑
|
||||
show | possessed object
🗑
|
||||
show | power surge
🗑
|
||||
show | power usage effectiveness (PUE)
🗑
|
||||
Popular e-mail encryption program that is free for personal, noncommercial use. | show 🗑
|
||||
show | private key encryption
🗑
|
||||
Process that attempts to prevent software piracy by requiring users to provide a software product’s 25-character identification number in order to receive an installation identification number. | show 🗑
|
||||
Server outside a company’s network that controls which communications pass into the company’s network. | show 🗑
|
||||
show | public key encryption
🗑
|
||||
show | quarantine
🗑
|
||||
Safeguard used by some businesses to track and identify the location of high-risk or high-value items. | show 🗑
|
||||
show | repetitive strain injury (RSI)
🗑
|
||||
show | restore
🗑
|
||||
Program that hides in a computer and allows someone from a remote location to take full control of the computer. | show 🗑
|
||||
Someone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action but does not have the technical skills and knowledge. | show 🗑
|
||||
Security technique that allows users to choose an encryption scheme for data that passes between a client and a server. | show 🗑
|
||||
show | secure site
🗑
|
||||
Security technique that provides encryption of all data that passes between a client and an Internet server. | show 🗑
|
||||
show | selective backup
🗑
|
||||
Type of cookie that is used by online shopping sites to keep track of items in a user’s shopping cart. | show 🗑
|
||||
License agreement included with software purchased by individual users. See also end-user license agreement (EULA). | show 🗑
|
||||
Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others. | show 🗑
|
||||
show | software theft
🗑
|
||||
Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once. | show 🗑
|
||||
Electrical disturbance that occurs when an overvoltage lasts for less than one millisecond (one thousandth of a second). | show 🗑
|
||||
show | spim
🗑
|
||||
Spam sent via VoIP. | show 🗑
|
||||
show | spoofing
🗑
|
||||
show | spyware
🗑
|
||||
show | SSID
🗑
|
||||
show | standby UPS
🗑
|
||||
show | surge protector
🗑
|
||||
show | surge suppressor
🗑
|
||||
Type of encryption where both the originator and the recipient use the same secret key to encrypt and decrypt the data. See also private key encryption. | show 🗑
|
||||
show | system failure
🗑
|
||||
Inflammation of a tendon due to repeated motion or stress on that tendon. | show 🗑
|
||||
Backup policy that preserves three copies of important files: the grandparent, the parent, and the child. | show 🗑
|
||||
Successor to Secure Sockets Layer (SSL), a security technique that provides encryption of all data that passes between a client and an Internet server. | show 🗑
|
||||
show | Trojan horse
🗑
|
||||
show | trusted source
🗑
|
||||
Use of a computer or network without permission. | show 🗑
|
||||
show | unauthorized use
🗑
|
||||
show | undervoltage
🗑
|
||||
show | Underwriters Laboratories (UL) 1449 Standard
🗑
|
||||
show | uninterruptible power supply (UPS)
🗑
|
||||
Unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user. See also user name. | show 🗑
|
||||
show | user name
🗑
|
||||
show | virtual private network (VPN)
🗑
|
||||
show | virus
🗑
|
||||
show | virus definition
🗑
|
||||
show | virus hoax
🗑
|
||||
Known specific pattern of virus code. See also virus definition. | show 🗑
|
||||
Intrusion technique in which an individual attempts to detect wireless networks via their notebook computer while driving a vehicle through areas they suspect have a wireless network. See also access point mapping. | show 🗑
|
||||
Intrusion technique in which individuals use an airplane to detect unsecured wireless networks. | show 🗑
|
||||
show | Web bug
🗑
|
||||
Program that restricts access to certain material on the Web. | show 🗑
|
||||
show | Wi-Fi Protected Access (WPA)
🗑
|
||||
Program that copies itself repeatedly, using up system resources and possibly shutting down the system. | show 🗑
|
||||
A compromised computer whose owner is unaware the computer is being controlled remotely by an outsider. | show 🗑
|
||||
Group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes. See also botnet. | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
sheidkamp
Popular Computers sets