Final Comp

Final study

60 cards   |   Total Attempts: 189
  

Cards In This Set

Front Back
A(n) _________________________ is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
Computer security risk
Any illegal act involving a computer generally is referred to as a(n) ____________________.
Computer crime
The term ____________________ refers to online or Internet-based illegal acts.
Cybercrime
A(n) ____________________ has the same intent as a cracker but does not have the technical skills and knowledge.
Script kiddie
A(n) ____________________ is someone who uses e-mail as a vehicle for extortion.
Cyberextortionist
A(n) ____________________ is someone who uses the Internet or network to destroy or damage computers for political reasons.
Cyberterrorist
A(n) ____________________ is the destructive event or prank malware is intended to deliver.
Payload
A(n) ____________________ protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.
Antivirus program
____________________ is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.
Spoofing
_________________________ automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies network administrators of suspicious behavior patterns or system breaches, including violations of firewalls.
Intrusion detection software
Many Web sites require a user to enter a(n) ____________________, which is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user.
Username or
user name
Many Web sites require a user to enter a(n) _________________________, which is a private combination of characters associated with a user name that allows access to certain computer resources.
Password
____________________ is the act of stealing computer equipment.
Hardware theft
14. ____________________ occurs when someone steals software media, intentionally erases programs, or illegally copies a program
Software theft
To protect themselves from software piracy, software manufacturers issue a(n) ____________________, which gives users the right to use the software.
License agreement