Chapter 5.1

Acceptable use Policy
Outline the activity for which a computer and network may be used
Access Control
a security measure that defines who can access a computer device or network
a program that displays an online advertisement in a banner or pop up ad
Audit trail
an electronic file that that records both successful and unsuccessful access attempts
Back Door
a program or set of instructions in a program that allows users to bypass security control
Biometric Device
device that authenticates a personal characteristic into a digital code
Back up
a duplicate of content on a storage medium that you can use
Biometric payment
payment method in which the customers fingerprints is read by a finger print reader that is linked to a payment method
a program that preforms a repetitive task on a network
Bot Net
a group of compromised computer or mobile devices connected to a network that are used to attack other networks
Browsing History
a list of all websites you have visited over a period of time
Business software alliance
alliance formed by major worldwide software companies to promote the understanding software privacy
a program that displays an image containing distorted characters for a user to identify and enter in to verify that they are human and not a computer program
Certificate authority
online program that issues digital certificates
a federally funded internet security and research development center
terminal in the third generation backup to refer to the most recent back up
Cyphr text
encrypted data
Click Jacking
scam in which an object that can be clicked on a website such as a button image or link contains malicious program
Cloud Back up
backup method in which files are backed up tot he cloud as they change
Code of Conduct
a written guideline that helps determine weather a specific acting is ethical or unethical or allowed or not allowed
Computer Crime
any illegal act involves the use of a computer or related device
Computer Emergency response team coordinate center
a federally funded internet security research and development center
Computer ethics
the moral guidelines that govern the use of computers mobile devices and information systems
Content Filtering
the process of restoring certain material
Continuous data protection
backup method in which all data is backed up when ever a change is made
a small text file that a webserver stores on your computer
exclusive rights given to authors artists and other creators of original work to duplicate publish and sell their materials
some one who accesses a computer or network illegally with the internet of destroying data and stealing information
Crime ware
software used by cyber criminals
Cyber crime
online or internet based illegal acts
Cyber extortionists
someone who demands payment to stop an attack on an organized technology infrastructure
Cyber Forensics
the discovery collection and analysis of evidence found on computer and networks
Cyber Terrorists
some one who uses the internet or network to destroy or damage computers for political reasons
Cyber warfare
a cyber attack whose goal ranges from disabling a government computer network to crippling a country
the process of decoding encrypted data
Denial of service attack
an assault whose purpose is to disrupt computer access to an internet service
Differential back up
backup method that copies only the files that have changed since the last full back up
Digital rights management
a strategy designed to prevent illegal distribution of movies music and other digital content
Digital security risk
an event or action hat can cause a loss or damage to computer or mobile device hardware software data information or processing capabilities
Tagged In :

Get help with your homework

Haven't found the Essay You Want? Get your custom essay sample For Only $13.90/page

Sarah from studyhippoHi there, would you like to get such a paper? How about receiving a customized one?

Check it out