Chapter 4 Key Terms:
ITGS
Sunday, March 18, 2012
Chapter 10 Key Terms:
Access-Control Software: | Software that only allows user access according to the user's needs. Some users can open only files that are related to their work. Some users are allowed read-only access to files they can see but not change. Example: Access control software doesn’t need to treat all users identically. |
Antivirus: | A program designed to search for viruses, notify users when they're found, and remove them from infected files. Example: Antivirus programs are designed to search for viruses. |
Autonomous System: | Complex systems that can assume almost complete responsibility for a task without human input, verification, or decision-making. Example: Complex system that can complete responsibility for a task without human input. |
Backup: | The process of saving data especially for data recovery. Many systems automatically back up data and software onto disks or tapes. Example: Insurance is a system of making regular backup. |
Biometrics: | Measurements of individual body characteristics, such as a voiceprint or fingerprint; sometimes used in computer security. Example: Finger print, Voice print, Retinal scan these measurements are collectively called Biometrics. |
Botnets: | A malicious network made up of bots, or zombie computers, often used by spammers, phishers, and other Internet criminals. Example: Malicious networks are often called Botnets. |
Computer Crime: | Any crime accomplished through knowledge or use of computer technology. Example: Computer crimes are accomplished though knowledge or use of computer technology. |
Computer Security: | Protecting computer systems and the information they contain against unwanted access, damage, modification, or destruction. Example: Computer Security refers to protecting computer systems. |
Cybercrime: | Any crime accomplished through knowledge or use of computer technology. Example: Cybercrime accomplished through knowledge or use of computer technology. |
Denial-of-Service (DOS) Attack: | A type of computer vandalism that bombards servers and Web sites with so much bogus traffic that they're effectively shut down, denying service to legitimate customers and clients. Example: Bombard servers and websites with so much bogus traffic. |
Encryption: | Protects transmitted information by scrambling the transmissions. When a user encrypts a message by applying a secret numerical code (encryption key), the message can be transmitted or stored as an indecipherable garble of characters. The message can be read only after it's been reconstructed with a matching key. Example: To protect transmitted information, many organizations and individuals use encryption software. |
Firewall: | A software or hardware "gate" that protects internal networks from unauthorized access. Example: Firewalls used to keep their networks secure. |
Hacking: | Example: Hacking could be stealing information. |
Identity Theft: | The crime, committed by hackers or other unscrupulous individuals, of obtaining enough information about a person to assume his or her identity, often as a prelude to illegally using the victim's credit cards. Example: Steal a persons Identity using there information. |
Logic Bomb: | A program designed to attack in response to a particular logical event or sequence of events. A type of software sabotage. Example: Logic bomb is programmed to attack in response to a particular event or sequence of event. |
Malware: | Malicious software, especially destructive programs such as the viruses, worms, and Trojan horses devised and spread by computer saboteurs. Example: Modern computer saboteurs commonly use Malware-malicious software. |
Passwords: | The most common security tools used to restrict access to computer systems. Example: Passwords are the most common tools used to restrict access to PCs. |
Phishing: | The use of a deceptive email message or Web site to lure a person into divulging credit card numbers or other sensitive information. Example: Internet fraud technique commonly called Phishing. |
Sabotage: | A malicious attack on work, tools, or business. Example: Sabotage comes from the early days of Industrial Revolution. |
Security Patch: | Software programs that plug potential security breaches in an operating system, often provided as free downloads or automatic updates to all owners of the OS. Example: Microsoft and Apple release Security patches. |
Smart Weapons: | A missile that uses computerized guidance systems to locate its target. Example: Smart weapons missiles that use computerized guidance system. |
Social Engineering: | Slang for the use of deception to get individuals to reveal sensitive information. Example: Credit card theft, password theft and identity theft often involves Social Engineering. |
Spoofing: | A process used to steal passwords online. Example: Trick the target in to doing something they might not otherwise do. |
Spyware: | Technology that collects information from computer users without their knowledge or consent. Example: Spyware refers to technology that collects information. |
System Administrator: | A user who has additional access privileges, such as permission to install software applications and change system settings. Example: At lest one of the accounts on a PC or Mac must be System Administrator. |
Trojan Horse: | A program that performs a useful task while at the same time carrying out some secret destructive act. A form of software sabotage. Example: Trojan horse is a program that performs a useful task while at the same time carrying out some secret destructive act. |
Uninterruptible power Supply (UPS): | A hardware device that protects computers from data loss during power failures. Example: Uninterruptible power supply can protect computers from data lose during power failures. |
Virus: | Software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. A form of software sabotage. Example: Virus software is a piece of code usually hidden in the operating system. |
Worms: | Programs that use computer hosts to reproduce themselves. Worm programs travel independently over computer networks, seeking out uninfected workstations to occupy. A form of software sabotage. Example: Worms use hosts to reproduce and can travel independently over computer networks. |
Subscribe to:
Comments (Atom)