Chapter 5
1. digital secutiry risk
2. an illegal act involving the use of computer or related devices is referred to as a (computer cime)
3. a an online or internet base illegal act (cyber crimer)
4. is short for malice software (malware)
5. a group of computers connected to a network (botnet)
6. a disrupt computer access to internet srvices (DOS attack) denial of sevice
7. a set of intrusctions in a program to by pass security control (backdoor)
8. a technique used to make their internet legal (spoofing)
9. a is hardware and or software that protect internet resources from (firewall) (intrusion)
10. is the use of the computer without permission (unauthorized access)
11. use of computer for unapproved activity (unauthorized use )
12. tells a person identity (biometric device)
13. discovery collection analysis of evidence found on computers and netwrok (digital forensics)
14. occurs illegally copies a program (software theft)
15. steals confidential information (information theft)
16. the process of converting data encoded characters (encryption)
17. is encrypted code that a person or oganization or website attaches to a msg to verify the sender (digital signiture)
18. a notice nthat guarantees that a user or website is legal (digital certificate)
19.a website that uses technique to secure its known as a secure site ( encryption)
20. act of stealing digital equipment (hardware theft)
21. act of destroying digital equipment (hardware vandalism)
22. backup
23. govern the use of computers ( computer ethics)
24. the right to whcih creators entitled to their work ( intellectual property)
25. reading guidelines helps determine specification allowed or not allowed ( code of conduct)
26. plan to design help prevent illegal distribution digital content (digital right management)
27. copyright
28. program that secretly collects information abouyt the user ( spyware)
program that displays
29. adware
30. gaining unauthorized access and taking advantage of a victim social engeneering
31. green computing -reduce of use of computers.
32. companies to deny strict collection information about them (information privacy)
33. cookies
34. employee monortoring
No comments:
Post a Comment