Chapter 5 Terms

thenorthstarblues's version from 2016-10-16 21:30


Question Answer
Back doora program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network
BackupA duplicate of content on a storage medium that you can use in case the original is lost, damaged, or destroyed
Biometric deviceDevice that authenticates a person's identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in a computer verifying a physical or behavioral characteristic
Botneta group of compromised computers or mobile devices connected to a network such as the Internet that are used to attack other networks, usually for nefarious purposes
Code of conductWritten guidelines that helps determine whether a specific action is ethical/unethical or allowed/not allowed
Computer crimeAny illegal act involving the use of a computer or related devices
Content filteringThe process of restricting access to certain material
CookieA small tet file that a web server stores on your computer
CrackerSomeone who accesses a computer or network illegally with the intent of destroying data, stealing information, or other malicious action
CybercrimeOnline or Internet-based illegal acts such as distributing malicious software or committing identity theft
CyberextortionistSomeone who demands payment to stop an attack on an organization's technology infrastructure
CyberterroristSomeone who uses the Internet or network to destroy or damage computers for political reasons
DecryptThe process of decoding encrypted data
Denial of service attackAn assault whose purpose is to disrupt computer access to an Internet service such as the web or email
Digital certificateA notice that guarantees a user or a website is legitimate
Digital forensicsThe discovery, collection, and analysis of evidence found on computers or networks
Digital security riskAny event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability
Digital signatureAn encrypted code that a person, website, or organization attached to an electronic message to verify the identity of the message sender
Disaster recovery planA written plan that describes the steps an organization would take to restore its computer operations in the event of a disaster
EncryptionThe process of converting data that is readable by humans into encoded characters to prevent unauthorized access
FirewallHardware and/or software that protects a network's resources from intrusion by users on another network, such as the Internet
Green computingPractices that involve reducing the electricity and environmental waste while using computers, mobile devices, and related technologies
Information privacyThe right of individuals and companies to deny or restrict the collection, use, and dissemination of information about them
Online security serviceA web app that evaluates out computer or mobile device to check for Internet and email vulnerabilities
Script kiddieCybercriminal who has the same intent as a cracker but does not have the technical skills and knowledge
Secure siteA website that uses encryption techniques to secure its data
Social engineeringScam in which perpetrators gain unauthorized access to or obtain confidential information by taking advantage of the trusting human nature of some victims and the naivete of others
Software piracyThe unauthorized and illegal duplication of copyrighted software
SpoofingThe process of sending documents to be printed to a buffer instead of sending them immediately to the printer
ZombieA compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider